Security Market Segment LS
Friday, 06 October 2017 10:06

Apple fixes Keychain vulnerability, but only in macOS High Sierra


The zero-day vulnerability in macOS's Keychain has been addressed by Apple, along with some other issues in High Sierra. But other recent versions of the operating system are still vulnerable.

Keychain is a convenient feature of macOS that provides encrypted storage for passwords, cryptographic keys, certificates and other sensitive information.

The Keychain feature makes provision for multiple keychains (sets of passwords, etc), but in practice most users store their data in the login keychain, which by default has the same password as that used to log into the system.

Normally, when applications add passwords to a keychain, they limit access to themselves and related software. For example, the password used by Safari to decrypt autofill data is only accessible by Safari, while a password used to connect to a SMB server is available to NetAuth, NetAuthAgent and NetAuthSysAgent.

Just before High Sierra was released, security researcher Patrick Wardle disclosed the existence of a vulnerability that allowed an application to extract in plaintext form all the passwords stored in a keychain.

Despite Wardle's detailed private notification, Apple went ahead and released High Sierra with this vulnerability. At least it wasn't remotely exploitable, but over the years some Mac users have been taken in by various Trojans, so there was a practical route for exploiting the vulnerability.

Apple released macOS High Sierra 10.13 Supplemental Update overnight to patch the vulnerability, crediting Wardle as the discoverer.

The issue is described thus: "A method existed for applications to bypass the keychain access prompt with a synthetic click. This was addressed by requiring the user password when prompting for keychain access."

The update also addresses another password-related issue in High Sierra: "If a hint was set in Disk Utility when creating an APFS encrypted volume, the password was stored as the hint. This was addressed by clearing hint storage if the hint was the password, and by improving the logic for storing hints."

If we're reading that correctly, it means that someone asking for the password hint was actually shown the password instead. So if you did set a hint, then if anyone has had physical access to your computer after High Sierra was installed it might be wise to investigate changing the disk encryption password.

Non-security changes in the update "Improves installer robustness", "Fixes a cursor graphic bug when using Adobe InDesign", and "Resolves an issue where email messages couldn’t be deleted from Yahoo accounts in Mail".

The update is available via the Mac App Store or from Apple's website.

But according to Wardle, macOS Sierra 10.12 is also vulnerable, and "El Capitan appears vulnerable as well".

There is no indication from Apple that a fix will be forthcoming for those versions. The company's position — which can only be inferred from what it does and does not release — seems to be that if a newer version of an operating system has the same hardware requirements as its predecessor, it feels no compulsion to offer a patch for the latter.

However, some users are unable to upgrade from Sierra to High Sierra until compatible versions of the applications they use are released, eg Adobe Illustrator.

And sometimes it appears that seemingly important security patches get thrown into the "too hard" basket – for example, the Broadpwn issue was only addressed in Sierra (and later), but it has been shown to affect Yosemite and El Capitan, and not all Macs running Yosemite can be upgraded to Sierra.


26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.



Recent Comments