ID

VAR-201710-1349


CVE

CVE-2017-7149


TITLE

Apple macOS of StorageKit Encrypted in components APFS Volume password vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-009370

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.13 Supplemental Update is affected. The issue involves the "StorageKit" component. It allows attackers to discover passwords for APFS encrypted volumes by reading Disk Utility hints, because the stored hint value was accidentally set to the password itself, not the entered hint value. Apple macOS is prone to a local unauthorized-access vulnerability. Attackers can exploit this issue to gain unauthorized access to the affected application. This may aid in further attacks. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. The vulnerability stems from the fact that the program sets the stored prompt value as a password. This was addressed by clearing hint storage if the hint was the password, and by improving the logic for storing hints. CVE-2017-7149: Matheus Mariano of Leet Tech Security Available for: macOS High Sierra 10.13 Impact: A malicious application can extract keychain passwords Description: A method existed for applications to bypass the keychain access prompt with a synthetic click. This was addressed by requiring the user password when prompting for keychain access. CVE-2017-7150: Patrick Wardle of Synack New downloads of macOS High Sierra 10.13 include the security content of the macOS High Sierra 10.13 Supplemental Update. Installation note: macOS High Sierra 10.13 Supplemental Update may be obtained from the Mac App Store or Apple's Software Downloads web site: https://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJZ1muIAAoJEIOj74w0bLRGK4YP/0po4Tefgarlu0uLyWAxst/6 KTtHK6sJs7wE0nsGJV1SUrKCLtuKo82mOkLJU5a7iS2qBcCLZVFr63HlG6nPDsJU mTfEGcUoVJMLy8BvkHxuQKA9h/4dymZ+4irQZ6ZxUKWYSIBowf0p2oWmwjxKY3v1 BNRx7bLnJH3bOej2EZbwGUVUMVWxlnGTeHQwGNrSoHlWQayZy/S9mJQRFlG8UlrQ C3EH8PxMNJKQuClP5WutREFzoY5uod4v24yFwlz1OdnyNhafprQnRUJaFlpiD0Fi oVf4OnuPOxI1txZ+QIN3virg3/TI/uLKYFpVatrw/sBiFPPD1W3PSHTGF3LtXAVf WFx7OQpAw/IFir2UZXMoOzMA7jrKgROn393/utbNVemoeUlr0SwG83zTsL/fmLGB m0u2PhHgUvTkGmTrdf8DCr1RCs20Q1KahkScUT3iBFoEGP+Tqy1PTgXb+2KFGKL3 nA8r7fWu1aFRu/rLUPO+cs46Y1LSqxmgYlYE1B2W5mpO03EUyNzq3aoI68s97+UI xka2V//xbhFTok4r08bLKK+KvNC2qan6MyMEqqp9PNsWOTtUoEw1EJTrQoQkMkjp /qPFwGe6LDOtxWDB1LMC80Ruto3CiSbkmLN6D9XLYKQnbuJSQiioU/VWIG5EN+lC +olewerlqcRryeVWc4IM =Frfq -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2017-7149 // JVNDB: JVNDB-2017-009370 // BID: 101178 // VULHUB: VHN-115352 // PACKETSTORM: 144523

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.13

Trust: 1.4

vendor:applemodel:mac os xscope:lteversion:10.13

Trust: 1.0

vendor:applemodel:macosscope:eqversion:10.13

Trust: 0.3

sources: BID: 101178 // JVNDB: JVNDB-2017-009370 // CNNVD: CNNVD-201703-925 // NVD: CVE-2017-7149

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7149
value: HIGH

Trust: 1.0

NVD: CVE-2017-7149
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201703-925
value: HIGH

Trust: 0.6

VULHUB: VHN-115352
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-7149
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-115352
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7149
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-115352 // JVNDB: JVNDB-2017-009370 // CNNVD: CNNVD-201703-925 // NVD: CVE-2017-7149

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-200

Trust: 0.9

sources: VULHUB: VHN-115352 // JVNDB: JVNDB-2017-009370 // NVD: CVE-2017-7149

THREAT TYPE

local

Trust: 0.9

sources: BID: 101178 // CNNVD: CNNVD-201703-925

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201703-925

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009370

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT208165url:https://support.apple.com/en-us/HT208165

Trust: 0.8

title:HT208165url:https://support.apple.com/ja-jp/HT208165

Trust: 0.8

title:Apple macOS High Sierra StorageKit Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99688

Trust: 0.6

sources: JVNDB: JVNDB-2017-009370 // CNNVD: CNNVD-201703-925

EXTERNAL IDS

db:NVDid:CVE-2017-7149

Trust: 2.9

db:BIDid:101178

Trust: 2.0

db:SECTRACKid:1039513

Trust: 1.7

db:JVNDBid:JVNDB-2017-009370

Trust: 0.8

db:CNNVDid:CNNVD-201703-925

Trust: 0.7

db:PACKETSTORMid:144523

Trust: 0.2

db:VULHUBid:VHN-115352

Trust: 0.1

sources: VULHUB: VHN-115352 // BID: 101178 // JVNDB: JVNDB-2017-009370 // PACKETSTORM: 144523 // CNNVD: CNNVD-201703-925 // NVD: CVE-2017-7149

REFERENCES

url:http://www.securityfocus.com/bid/101178

Trust: 1.7

url:https://support.apple.com/ht208165

Trust: 1.7

url:https://hackernoon.com/new-macos-high-sierra-vulnerability-exposes-the-password-of-an-encrypted-apfs-container-b4f2f5326e79

Trust: 1.7

url:https://nakedsecurity.sophos.com/2017/10/05/urgent-update-your-mac-again-right-now/

Trust: 1.7

url:https://www.theregister.co.uk/2017/10/05/apple_patches_password_hint_bug_that_revealed_password/

Trust: 1.7

url:http://www.securitytracker.com/id/1039513

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2017-7149

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7149

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:https://www.apple.com/support/downloads/

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7150

Trust: 0.1

sources: VULHUB: VHN-115352 // BID: 101178 // JVNDB: JVNDB-2017-009370 // PACKETSTORM: 144523 // CNNVD: CNNVD-201703-925 // NVD: CVE-2017-7149

CREDITS

Matheus Mariano of Leet Tech

Trust: 0.3

sources: BID: 101178

SOURCES

db:VULHUBid:VHN-115352
db:BIDid:101178
db:JVNDBid:JVNDB-2017-009370
db:PACKETSTORMid:144523
db:CNNVDid:CNNVD-201703-925
db:NVDid:CVE-2017-7149

LAST UPDATE DATE

2025-04-20T23:25:55.723000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-115352date:2019-10-03T00:00:00
db:BIDid:101178date:2017-10-05T00:00:00
db:JVNDBid:JVNDB-2017-009370date:2017-11-09T00:00:00
db:CNNVDid:CNNVD-201703-925date:2019-10-23T00:00:00
db:NVDid:CVE-2017-7149date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-115352date:2017-10-23T00:00:00
db:BIDid:101178date:2017-10-05T00:00:00
db:JVNDBid:JVNDB-2017-009370date:2017-11-09T00:00:00
db:PACKETSTORMid:144523date:2017-10-05T18:22:22
db:CNNVDid:CNNVD-201703-925date:2017-03-22T00:00:00
db:NVDid:CVE-2017-7149date:2017-10-23T01:29:14.157