In less than 24 hours time, Apple released a security fix to address the critical root vulnerability bug that Apple became aware of Tuesday afternoon. If you haven’t heard about the bug, you can click here.

Wednesday morning Apple released an update to address the issue. Users running macOS High Sierra either installed it when it initially released or the update was installed automatically later in the afternoon. The update was available through the Mac App Store.

Apple issued the following statement when the fix became available Wednesday morning:

Security is a top priority for every Apple product, and regrettably we stumbled with this release of macOS.

When our security engineers became aware of the issue Tuesday afternoon, we immediately began working on an update that closes the security hole. This morning, as of 8 a.m., the update is available for download, and starting later today it will be automatically installed on all systems running the latest version (10.13.1) of macOS High Sierra.

We greatly regret this error and we apologize to all Mac users, both for releasing with this vulnerability and for the concern it has caused. Our customers deserve better. We are auditing our development processes to help prevent this from happening again.

The security flaw was stated in the updates release notes:


Released November 29, 2017

Directory Utility

Available for: macOS High Sierra 10.13.1

Not impacted: macOS Sierra 10.12.6 and earlier

Impact: An attacker may be able to bypass administrator authentication without supplying the administrator’s password

Description: A logic error existed in the validation of credentials. This was addressed with improved credential validation.


When you install Security Update 2017-001 on your Mac, the build number of macOS will be 17B1002. Learn how to find the macOS version and build number on your Mac.

If you require the root user account on your Mac, you can enable the root user and change the root user’s password.

By now, your mac should have already updated to the latest version to fix the issue.

You can follow us on Twitter by clicking here and you can Like us on Facebook by clicking here. Until next time, peace!