macOS 10.13 Authentication Bypass Remote Check (CVE-2017-13872)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by an authentication bypass vulnerability.

Description :

The remote host is affected by an authentication bypass vulnerability.
A local attacker or a remote attacker with credentials for a standard
user account has the ability to blank out the root account password.
This can allow an authenticated attacker to escalate privileges to
root and execute commands and read files as a system administrator.
A remote attacker without credentials can set passwords on certain
disabled accounts.

Note that if this plugin is successful, Nessus has set the password on
the 'nobody' account to 'nessus', and you will need to reset this
password/re-disable this account to clean up.

See also :

https://support.apple.com/en-us/HT208315
http://www.nessus.org/u?2cf4b55a
http://www.nessus.org/u?9ff9ff45
http://www.nessus.org/u?1e5890f3
http://www.nessus.org/u?f367aab4
http://www.nessus.org/u?f9f9bbc3

Solution :

Apply Apple Security Update 2017-001.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 105003 ()

Bugtraq ID: 101981

CVE ID: CVE-2017-13872

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now