<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Password-Disclosure — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/password-disclosure/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/password-disclosure/feed.xml" rel="self" type="application/rss+xml"/><item><title>macOS High Sierra APFS Password Disclosure Vulnerability (CVE-2017-7149)</title><link>https://feed.craftedsignal.io/briefs/2024-01-macos-apfs-password-disclosure/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-macos-apfs-password-disclosure/</guid><description>CVE-2017-7149 is a vulnerability in macOS High Sierra (10.13) where the password for an encrypted APFS volume is stored as plain text in the password hint, potentially allowing a local attacker to gain unauthorized access.</description><content:encoded><![CDATA[<p>CVE-2017-7149 is a critical vulnerability affecting macOS High Sierra (10.13) related to the handling of passwords for encrypted Apple File System (APFS) volumes. Discovered by Matheus Mariano, the vulnerability exposes the password as plain text within the password hint field. This occurs during the creation of an encrypted APFS volume using Disk Utility.app. While Apple has addressed this issue with a patch, the flaw allows a local attacker to potentially bypass encryption and access sensitive data stored within the encrypted volume. The vulnerability stems from an apparent mixup between the password and password hint fields during the volume creation process.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A local attacker gains access to a macOS High Sierra (10.13) system.</li>
<li>The attacker opens Disk Utility.app.</li>
<li>The attacker initiates the process of mounting an encrypted APFS volume.</li>
<li>The system prompts the attacker for the password to unlock the volume.</li>
<li>The attacker clicks the &lsquo;Show Hint&rsquo; button in the password prompt dialog.</li>
<li>Instead of the intended password hint, the system displays the actual password for the encrypted volume in plain text.</li>
<li>The attacker uses the displayed password to unlock and mount the encrypted APFS volume.</li>
<li>The attacker gains full access to all data stored within the decrypted APFS volume.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2017-7149 results in the unauthorized disclosure of the password for an encrypted APFS volume. A local attacker can leverage this to bypass encryption, mount the volume, and gain access to all sensitive data stored within. This vulnerability impacts macOS High Sierra (10.13) users who utilize encrypted APFS volumes for data protection. The number of affected users is unknown, but the potential for data compromise is significant for any user relying on APFS encryption on the affected operating system version.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>If running an unpatched macOS High Sierra (10.13) system, upgrade to a patched version to remediate CVE-2017-7149.</li>
<li>Enable system integrity protection (SIP) to make debugging and tampering with system processes more difficult for attackers.</li>
<li>Monitor for suspicious activity involving Disk Utility.app, specifically attempts to mount or access encrypted APFS volumes. Deploy the Sigma rule to detect unusual process execution patterns related to Disk Utility.app.</li>
<li>Audit existing APFS volumes for password hints that may contain sensitive information due to this vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>apfs</category><category>password-disclosure</category><category>privilege-escalation</category><category>macos</category></item></channel></rss>