The flaw in macOS High Sierra can reveal your passwords after typing specific command in Terminal
Mac operating system is known as stable and secure. However, the recent version of macOS makes us doubting if it’s still true. Not so long ago, a concerning High Sierra bug gave anyone root access to a computer.[1] However, recently discovered Mac bug allows getting your passwords in plaintext.
The vulnerability is detected in macOS 10.13 and macOS 10.13.3 versions[2] in unencrypted Apple's File System (APFS) for macOS volume. But it seems that the bug was fixed in 10.13.2 systems and does not exist in the 10.13.4 version available for developers only.
APFS is responsible for organizing and structuring information on a storage system.[3] However, the security vulnerability allows accessing passwords of APFS external drives by executing the following command with Terminal:
log stream –info –predicate 'eventMessage contains “newfs_”'
Once this command is executed, passwords are exposed.
Problems with APFS have been reported before
Earlier this year, another serious problem with APFS was discovered too. Mac backup software company Bombich[4] reported about the issue with the APFS-formatted disk image. Fortunately, it affected only in APFS sparse disk images, which are not widely used. However, it doesn’t change the fact that it may lead to loss of the important data:
I noticed that an APFS-formatted sparsebundle disk image volume showed ample free space, despite that the underlying disk was completely full. Curious, I copied a video file to the disk image volume to see what would happen. The whole file copied without error! I opened the file, verified that the video played back start to finish, checksummed the file – as far as I could tell, the file was intact and whole on the disk image. When I unmounted and remounted the disk image, however, the video was corrupted.
Source: Bombich blog
A sparse disk image is mostly used for backing up and disk cloning. Mac OS treats this file as a physical drive and can grow in size when a user adds more data to it. Meanwhile, SSD startup disk or other popular APFS volumes were not affected by this issue.
Apple released macOS High Sierra 10.13.4 beta version
On Monday, Apple released a new version of the operating system for testing. Developers can download macOS High Sierra 10.13.4 beta 7 now from Mac App Store or official Apple’s developer website.
According to the release note, this macOS update fixed several bugs. Though, any major updates or improvements are not included. However, this version of OS does not include a previously mentioned error that allows extracting passwords.
Apple developers improved and fixed issues that were detected in App Store, Safari, iBooks or during the installation of operating system. It also includes new features, such as Messages in iCloud, support for Business Chat in Messages in the United States and Canada and improved eGPU (external graphics card enclosure) management.[5]
- ^ Juli Clover. Major macOS High Sierra Bug Allows Full Admin Access Without Password - How to Fix [Updated]. MacRumors. Apple, Mac, iOS rumors and news.
- ^ Uh Oh! Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes via Disk Utility.app. Mac4n6. Mac OS X and iOS forensic research, blog, and resources.
- ^ Tom Nelson. What Is APFS (Apple's File System for macOS)?. Lifewire. Tech how-to guides and tutorials.
- ^ macOS may lose data on APFS-formatted disk images. Bombich blog. The official company blog.
- ^ Nirnjan Regmi. Download: macOS High Sierra 10.13.4 Beta 7 is now available. iMangoss. iOS, Apple news, IPSW, rumors, tips, tricks, hacks, Jailbreak, Tweaks, games, applications and everything about iDevices.