ID

VAR-201710-1350


CVE

CVE-2017-7150


TITLE

Apple macOS Vulnerability that can bypass the keychain access prompt in the security component

Trust: 0.8

sources: JVNDB: JVNDB-2017-009371

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.13 Supplemental Update is affected. The issue involves the "Security" component. It allows attackers to bypass the keychain access prompt, and consequently extract passwords, via a synthetic click. Apple macOS is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass security restrictions and perform unauthorized actions. This may aid in further attacks. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2017-10-05-1 macOS High Sierra 10.13 Supplemental Update macOS High Sierra 10.13 Supplemental Update is now available and addresses the following: StorageKit Available for: macOS High Sierra 10.13 Impact: A local attacker may gain access to an encrypted APFS volume Description: If a hint was set in Disk Utility when creating an APFS encrypted volume, the password was stored as the hint. This was addressed by clearing hint storage if the hint was the password, and by improving the logic for storing hints. This was addressed by requiring the user password when prompting for keychain access. CVE-2017-7150: Patrick Wardle of Synack New downloads of macOS High Sierra 10.13 include the security content of the macOS High Sierra 10.13 Supplemental Update. Installation note: macOS High Sierra 10.13 Supplemental Update may be obtained from the Mac App Store or Apple's Software Downloads web site: https://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJZ1muIAAoJEIOj74w0bLRGK4YP/0po4Tefgarlu0uLyWAxst/6 KTtHK6sJs7wE0nsGJV1SUrKCLtuKo82mOkLJU5a7iS2qBcCLZVFr63HlG6nPDsJU mTfEGcUoVJMLy8BvkHxuQKA9h/4dymZ+4irQZ6ZxUKWYSIBowf0p2oWmwjxKY3v1 BNRx7bLnJH3bOej2EZbwGUVUMVWxlnGTeHQwGNrSoHlWQayZy/S9mJQRFlG8UlrQ C3EH8PxMNJKQuClP5WutREFzoY5uod4v24yFwlz1OdnyNhafprQnRUJaFlpiD0Fi oVf4OnuPOxI1txZ+QIN3virg3/TI/uLKYFpVatrw/sBiFPPD1W3PSHTGF3LtXAVf WFx7OQpAw/IFir2UZXMoOzMA7jrKgROn393/utbNVemoeUlr0SwG83zTsL/fmLGB m0u2PhHgUvTkGmTrdf8DCr1RCs20Q1KahkScUT3iBFoEGP+Tqy1PTgXb+2KFGKL3 nA8r7fWu1aFRu/rLUPO+cs46Y1LSqxmgYlYE1B2W5mpO03EUyNzq3aoI68s97+UI xka2V//xbhFTok4r08bLKK+KvNC2qan6MyMEqqp9PNsWOTtUoEw1EJTrQoQkMkjp /qPFwGe6LDOtxWDB1LMC80Ruto3CiSbkmLN6D9XLYKQnbuJSQiioU/VWIG5EN+lC +olewerlqcRryeVWc4IM =Frfq -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2017-7150 // JVNDB: JVNDB-2017-009371 // BID: 101177 // VULHUB: VHN-115353 // VULMON: CVE-2017-7150 // PACKETSTORM: 144523

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.12.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.13

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.12.6

Trust: 0.6

vendor:applemodel:macosscope:eqversion:10.13

Trust: 0.3

sources: BID: 101177 // JVNDB: JVNDB-2017-009371 // CNNVD: CNNVD-201703-924 // NVD: CVE-2017-7150

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7150
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-7150
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201703-924
value: MEDIUM

Trust: 0.6

VULHUB: VHN-115353
value: LOW

Trust: 0.1

VULMON: CVE-2017-7150
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-7150
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-115353
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7150
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-115353 // VULMON: CVE-2017-7150 // JVNDB: JVNDB-2017-009371 // CNNVD: CNNVD-201703-924 // NVD: CVE-2017-7150

PROBLEMTYPE DATA

problemtype:CWE-521

Trust: 1.1

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-115353 // JVNDB: JVNDB-2017-009371 // NVD: CVE-2017-7150

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201703-924

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201703-924

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009371

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT208165url:https://support.apple.com/en-us/HT208165

Trust: 0.8

title:HT208165url:https://support.apple.com/ja-jp/HT208165

Trust: 0.8

title:Apple macOS High Sierra Security Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99687

Trust: 0.6

title:The Registerurl:https://www.theregister.co.uk/2017/10/05/apple_patches_password_hint_bug_that_revealed_password/

Trust: 0.2

title:Awesome CVE PoCurl:https://github.com/lnick2023/nicenice

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/xbl3/awesome-cve-poc_qazbnm456

Trust: 0.1

title:Awesome CVE PoCurl:https://github.com/qazbnm456/awesome-cve-poc

Trust: 0.1

sources: VULMON: CVE-2017-7150 // JVNDB: JVNDB-2017-009371 // CNNVD: CNNVD-201703-924

EXTERNAL IDS

db:NVDid:CVE-2017-7150

Trust: 3.0

db:BIDid:101177

Trust: 2.1

db:SECTRACKid:1039430

Trust: 1.8

db:JVNDBid:JVNDB-2017-009371

Trust: 0.8

db:CNNVDid:CNNVD-201703-924

Trust: 0.7

db:VULHUBid:VHN-115353

Trust: 0.1

db:VULMONid:CVE-2017-7150

Trust: 0.1

db:PACKETSTORMid:144523

Trust: 0.1

sources: VULHUB: VHN-115353 // VULMON: CVE-2017-7150 // BID: 101177 // JVNDB: JVNDB-2017-009371 // PACKETSTORM: 144523 // CNNVD: CNNVD-201703-924 // NVD: CVE-2017-7150

REFERENCES

url:http://www.securityfocus.com/bid/101177

Trust: 1.9

url:https://support.apple.com/ht208165

Trust: 1.8

url:http://www.securitytracker.com/id/1039430

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-7150

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7150

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:https://support.apple.com/en-us/ht208165

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/521.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.theregister.co.uk/2017/10/05/apple_patches_password_hint_bug_that_revealed_password/

Trust: 0.1

url:https://github.com/qazbnm456/awesome-cve-poc

Trust: 0.1

url:https://www.apple.com/support/downloads/

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7149

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

sources: VULHUB: VHN-115353 // VULMON: CVE-2017-7150 // BID: 101177 // JVNDB: JVNDB-2017-009371 // PACKETSTORM: 144523 // CNNVD: CNNVD-201703-924 // NVD: CVE-2017-7150

CREDITS

Patrick Wardle of Synack

Trust: 0.3

sources: BID: 101177

SOURCES

db:VULHUBid:VHN-115353
db:VULMONid:CVE-2017-7150
db:BIDid:101177
db:JVNDBid:JVNDB-2017-009371
db:PACKETSTORMid:144523
db:CNNVDid:CNNVD-201703-924
db:NVDid:CVE-2017-7150

LAST UPDATE DATE

2025-04-20T23:25:55.759000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-115353date:2019-10-03T00:00:00
db:VULMONid:CVE-2017-7150date:2019-10-03T00:00:00
db:BIDid:101177date:2017-10-05T00:00:00
db:JVNDBid:JVNDB-2017-009371date:2017-11-09T00:00:00
db:CNNVDid:CNNVD-201703-924date:2019-10-23T00:00:00
db:NVDid:CVE-2017-7150date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-115353date:2017-10-23T00:00:00
db:VULMONid:CVE-2017-7150date:2017-10-23T00:00:00
db:BIDid:101177date:2017-10-05T00:00:00
db:JVNDBid:JVNDB-2017-009371date:2017-11-09T00:00:00
db:PACKETSTORMid:144523date:2017-10-05T18:22:22
db:CNNVDid:CNNVD-201703-924date:2017-03-22T00:00:00
db:NVDid:CVE-2017-7150date:2017-10-23T01:29:14.190