Skip To Content
BuzzFeed News Home Reporting To You

Utilizamos cookies, próprios e de terceiros, que o reconhecem e identificam como um usuário único, para garantir a melhor experiência de navegação, personalizar conteúdo e anúncios, e melhorar o desempenho do nosso site e serviços. Esses Cookies nos permitem coletar alguns dados pessoais sobre você, como sua ID exclusiva atribuída ao seu dispositivo, endereço de IP, tipo de dispositivo e navegador, conteúdos visualizados ou outras ações realizadas usando nossos serviços, país e idioma selecionados, entre outros. Para saber mais sobre nossa política de cookies, acesse link.

Caso não concorde com o uso cookies dessa forma, você deverá ajustar as configurações de seu navegador ou deixar de acessar o nosso site e serviços. Ao continuar com a navegação em nosso site, você aceita o uso de cookies.

Oops: The "Root" Login Bug Is Back In The Latest MacOS Update

Here's what to do to protect yourself against a massive macOS security flaw. (Again.)

Posted on December 1, 2017, at 7:22 p.m. ET

Josh Edelson / AFP / Getty Images

Earlier this week, Apple released a patch for a major security flaw in macOS High Sierra, the company's newest computer operating system — but today Wired is reporting that the bug is back in Apple's most recent system update, macOS High Sierra 10.13.1.

The vulnerability, which was first uncovered on Tuesday, allows anyone to log in to a Mac running macOS High Sierra by typing "root" as the username and clicking the login button multiple times. Three users who had downloaded the patch for this bug while running High Sierra 10.13.0, and then upgraded to 10.13.1, the most recent version of the software, tell Wired that the "root" vulnerability reappears.

Furthermore, after re-downloading the patch, these users say a restart is necessary to fix the "root" bug, even though the system does not prompt you to do so.

That patch Apple rushed out for its "root" security flaw? Three people tell me the fix is silently broken again if…

Apple did not immediately respond to a request for comment.

TL;DR — If you've updated your Mac to 10.13.1, open the App Store, and click on Updates to re-install the security patch, and restart your computer.

If you've already upgraded to 10.13.1 and *then* re-downloaded the patch after updating, you're OK.

A BuzzFeed News investigation, in partnership with the International Consortium of Investigative Journalists, based on thousands of documents the government didn't want you to see.