There is a security flaw in the most recent edition of macOS High Sierra, version 10.13.2, that allows users to unlock the App Store menu in System Preferences without knowing the password. The only caveat is that the exploit seems to only work on administrative-level accounts—attempts to reproduce the buggy behavior on standard accounts have not been successful. In addition, a fix is on the way.
For now, however, the steps to reproduce the bug on administrative-level account are pretty easy, as outlined by a bug report on Open Radar. They are as follows:
- Log in as a local admin
- Open the App Store
- Click on the padlock icon to lock it (if necessary)
- Click on the padlock icon again
- Enter your username and type in any password
- Click Unlock
Apple is aware of the vulnerability and has issued an apology.
"We greatly regret this error and we apologize to all Mac users, both for releasing with this vulnerability and for the concern it has caused. Our customers deserve better. We are auditing our development processes to help prevent this from happening again," Apple said in a statement.
Apple has also introduced a fix in the latest beta of macOS (version 10.13.3), which should show up in an update sometime later this month. It is also worth noting that the bug is not present in macOS High Sierra 10.12.6 and earlier builds.
This is the not first embarrassing moment for Apple in regards to macOS High Sierra. A previous exploit allowed unauthorized users to gain full admin access to a Mac computer simply by using the username "root" and offering up no password. And prior to that, there was a bug that allowed programs not approved by Apple to glean passwords from the Mac keychain when users asked the software to remember a password for them.