Skip to content Skip to footer
0 items - $0.00 0

CVE-2024-54471: Leaking Passwords (and More!) on macOS by nmgycombinator

CVE-2024-54471: Leaking Passwords (and More!) on macOS by nmgycombinator

CVE-2024-54471: Leaking Passwords (and More!) on macOS by nmgycombinator

6 Comments

  • Post Author
    janandonly
    Posted March 20, 2025 at 5:08 pm

    A very interesting article this is. Never knew there was so much lore in the making of the Mach and Darwin kernels .

  • Post Author
    junon
    Posted March 20, 2025 at 5:37 pm

    Well written article. It reminds me of the zero day that Apple tried to cover up somewhat – the "empty password tried twice" root login bypass. This was ca. 2017 or so, maybe 2018.

    You were able to type in an administrator username in any root sign in box (e.g. in the settings panel via the padlock icon) with an empty password. Hitting the Sign In button the first time told you that the password was incorrect. Dismissing that alert box and hitting sign in a second time signed you in as that user.

    We were able to reproduce it 100% of the time day-of, and of course was patched pretty shortly after making the rounds on social media. Still seems like a massive oversight though.

    Seems there's still some cruft around the auth mechanisms in Mac. Interesting to see the port system mentioned – it's not a well known fact of Mach kernels.

  • Post Author
    turnsout
    Posted March 20, 2025 at 6:47 pm

    At this point it feels like Mach is a reliable source of bugs in macOS. I know Apple is working hard to lock it all down, but is there any path to shifting away from Mach completely?

  • Post Author
    biofunsf
    Posted March 20, 2025 at 7:17 pm

    Does the author provide the actual PoC code anywhere? I want to do some testing for mitigations. I see the example code but it seems incomplete.

    Realistically what are the risks?

  • Post Author
    unit149
    Posted March 20, 2025 at 7:20 pm

    [dead]

  • Post Author
    nmgycombinator
    Posted March 20, 2025 at 7:25 pm

    A minor correction was made to the article:

    Entitlement checks are not in the Mach layer of the kernel.

    https://github.com/nmggithub/wts/commit/2bdce1c0c76c7adc360e…

    Just a one word change, fixing a factual inaccuracy when talking about how XNU works.

Leave a comment

In the Shadows of Innovation”

© 2025 HackTech.info. All Rights Reserved.

Sign Up to Our Newsletter

Be the first to know the latest updates

Whoops, you're not connected to Mailchimp. You need to enter a valid Mailchimp API key.