![]() ![]() However, with further testing, we discovered that this vulnerability could be exploited remotely, by an adversary with network access to a macOS High Sierra system with: (1) the default root account is disabled and (2) Apple’s Screen Sharing functionality enabled. During the initial disclosure of this vulnerability, the replication of the exploit required physical access. This vulnerability affects High Sierra version 10.13 and 10.13.1. ![]() We recommend immediately applying this update.Ī newly discovered flaw, disclosed by Lemi Ergin, within macOS High Sierra permits root-level access without requiring a password. ![]() ![]() This update is available for systems running macOS 10.13.1. UPDATE: Apple released a patch for CVE-2017–13872, Security Update 2017–001. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |