【1985 Archives】

2025-06-26 06:27:48 950 views 3541 comments

Apple issued an update for its High Sierra desktop operating system985 ArchivesThursday.

Called the "macOS High Sierra 10.13 Supplemental Update," the new update fixes two dangerous bugs in High Sierra, both of which exposed user passwords in some way.

SEE ALSO: Whoops, a hacker found a way to steal your passwords from macOS High Sierra

Naked Security has a great technical explanation of the first bug Apple fixed with the High Sierra update. In the simplest of terms, with the bug, if you created a new APFS (Apple File System) encrypted volume on High Sierra, and set anything at all as the password hint, then your password was stored as the hint. In plain text.

That means anyone could've gotten your password simply by clicking on the "Show Hint" button.

Interestingly, if you didn't choose anything as your password hint, you were safe.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!

The bug did require an attacker to have physical access to one's encrypted volume, like a drive on your MacBook or a USB stick. But this is not one of those bugs that requires a highly technical exploit: Apple literally handed out your encrypted disk's password to everyone, with one click of a mouse.

The bug was discovered by security expert Matheus Mariano on Sept. 27, and the collective response it got from experts was one of disbelief.

If you have an encrypted APFS volume, check whether your password hint displays your password. If it does, we've got more bad news: Fixing this isn't all that simple.

Per Apple's official explanation, you need to install the 10.13 High Sierra update from App Store, backup the data from the affected volume, unmount and erase the affected volume, reformat it as new APFS volume, encrypt it, choose a new password (hint optional), and then restore your data to the volume. Ouch.

Additionally, if you used that same password (the one you used for an affected encrypted APFS volume), you should change that as well.

Thursday's High Sierra update also fixes another nasty High Sierra bug, which we've written about in September. That particular issue allowed a malicious attacker to extract all your keychain passwords with an unsigned app.

While we're glad these bugs are now squashed, we certainly hope we won't see any such glaring omissions in Apple's software in the future.


Featured Video For You
This guy has 1,500 passwords, and a few tips for staying secure

Topics Apple Cybersecurity

Comments (61896)
Prosperous Times Information Network

Watch how an old Venus spacecraft tumbled before crashing to Earth

2025-06-26 06:17
Unique Information Network

Ron Swanson is deeply offended that Donald Trump went into politics

2025-06-26 05:27
Exploration Information Network

Another barbershop is giving haircut discounts to kids who read

2025-06-26 05:21
Transmission Information Network

Shop Owala's Memorial Day Sale for 30% off tumblers

2025-06-26 04:00
Search
Newsletter

Subscribe to our newsletter for the latest updates.

Follow Us