Skip to main content

Apple Mac OS X FileVault Plain Text Password Logging Vulnerability

Last Update Date: 8 May 2012 12:33 Release Date: 8 May 2012 4462 Views

RISK: Medium Risk

TYPE: Operating Systems - Mac OS

TYPE: Mac OS

A security issue has been identified in Apple Mac OS X, which can be exploited by malicious people with physical access to bypass certain security restrictions.

 

The security issue is caused due to the debug switch being enabled within FileVault when using "Legacy FileVault". This may lead to users' password being saved in DEBUGLOG in plain text and can be exploited to read the password via FireWire target disk mode.

 

Successful exploitation requires that OS X is upgraded from an older version and uses the "Legacy FileVault" feature.


Impact

  • Security Restriction Bypass
  • Information Disclosure

System / Technologies affected

  • Apple Mac OS X  version 10.7.3

Solutions

  • As a workaround use FileVault 2.

Vulnerability Identifier

  • No CVE information is available

Source


Related Link