Mac OS X Lion password-changing flaw uncovered
Changing passwords looks awfully simple for anyone who has acquired access to a Mac OS X Lion machine.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
A flaw in Apple's new OS lets those with access to a Mac running Lion change passwords without knowing the user's login details, a researcher has claimed.
In previous versions of the Apple OS, users wanting to change passwords had to enter their login information before making alterations.
Why crack hashes when you can just change the password directly?
Now that step is not needed, thanks to insecure permissions in the Mac OS X Lion's local directory service, researcher Patrick Dunstan said, writing on the Defense in Depth blog.
"Why crack hashes when you can just change the password directly?" Dunstan said. "It appears Directory Services in Lion no longer requires authentication when requesting a password change for the current user."
Dunstan also claimed it was possible to access other users' password hashes and therefore steal their login information.
In previous versions of Mac OS X, only those with root access were allowed to view so-called shadow files, which contain hashes and salts used to encrypt passwords.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Although non-root users cannot access the shadow file directly, they can still gain access to information in it by extracting data from the directory services on the OS. All that needs to be done is type in the right command into Terminal to get that information, the researcher claimed.
"The interesting thing about this? Root privileges are not required," Dunstan added. "All users on the system, regardless of privilege, have the ability to access the ShadowHashData attribute from any other user's profile."
A brute force attack could be used to crack passwords once the hash and salt are acquired.
Comments on the blog showed some claiming to have exploited the flaw successfully, whilst others were unable to do so.
At the time of publication, Apple had not responded to a request for comment on the alleged vulnerability.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Using AI to generate passwords is a terrible idea, experts warnNews Researchers have warned the use of AI-generated passwords puts users and businesses at risk
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
Researchers called on LastPass, Dashlane, and Bitwarden to up defenses after severe flaws put 60 million users at risk – here’s how each company respondedNews Analysts at ETH Zurich called for cryptographic standard improvements after a host of password managers were found lacking
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.


