First published: Mon Oct 23 2017(Updated: )
Security. A method existed for applications to bypass the keychain access prompt with a synthetic click. This was addressed by requiring the user password when prompting for keychain access.
Credit: Patrick Wardle Synack product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | <=10.12.6 | |
Apple macOS High Sierra | <10.13.1 | 10.13.1 |
Apple Sierra | ||
Apple El Capitan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2017-7150.
The severity of CVE-2017-7150 is medium with a severity value of 5.5.
macOS version 10.12.6 and versions up to but excluding 10.13.1 are affected by CVE-2017-7150.
Attackers can exploit CVE-2017-7150 by bypassing the keychain access prompt and extracting passwords via a synthetic click.
Yes, a fix for CVE-2017-7150 is available in macOS 10.13 Supplemental Update.