CVE-2017-13872
high-risk
Published 2017-11-29
An issue was discovered in certain Apple products. macOS High Sierra before Security Update 2017-001 is affected. The issue involves the "Directory Utility" component. It allows attackers to obtain administrator access without a password via certain interactions involving entry of the root user name.
Do I need to act?
!
76.7% chance of exploitation in next 30 days
EPSS score — higher than 23% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.1/10
High
NETWORK
/ HIGH complexity
Affected Vendors
References (20)
Third Party Advisory
http://www.securityfocus.com/bid/101981
Third Party Advisory
http://www.securitytracker.com/id/1039875
Vendor Advisory
https://support.apple.com/HT208315
Press/Media Coverage
https://www.wired.com/story/macos-update-undoes-apple-root-bug-patch/
Third Party Advisory
http://www.securityfocus.com/bid/101981
Third Party Advisory
http://www.securitytracker.com/id/1039875
Vendor Advisory
https://support.apple.com/HT208315
Press/Media Coverage
https://www.wired.com/story/macos-update-undoes-apple-root-bug-patch/
58
/ 100
high-risk
Severity
24/34 · High
Exploitability
27/34 · High
Exposure
7/34 · Low