Disclaimer: We sustain our work & review products through paid collaborations.
macOS Keychain Vulnerabilities Apple Doesn’t Want to Talk About

macOS Keychain Vulnerabilities Apple Doesn’t Want to Talk About


A serious vulnerability uncovered by security researcher Patrick Wardle from Synack has cast a dark shadow over the launch of Apple’s latest desktop operating system, macOS 10.13 High Sierra. This case also makes us wonder just how many security issues Apple’s desktop and mobile operating systems include.

While the latter question is a bit hard to answer – only time (and hackers) will tell – the common vulnerabilities and exposure (CVE) database reveals that Apple’s services aren’t as prone to hackers as users may think, despite this recently detected flaw. Some security experts say that the more popular the Mac becomes, the more likely it will be targeted by hackers. The passage of time seems to corroborate these claims as there has been a spike in attacks targeting Mac computers, though in spite of this macOS still remains one of the most secure desktop platforms.

Keychain access

iCloud vulnerabilities

In fact 2017 was quite a busy year for Apple: it had to patch 62 vulnerabilities involving iCloud in some way, which equates to only one issue appearing in the CVE database. Denial-of-service attacks are clearly the more widespread vulnerability since of the total of 63 issues, 82.5% (52) allowed attackers to execute arbitrary code or cause denial of service (memory corruption and application crash) via a crafted website. Some of these issues were severe, with a ranking vulnerability score of 9.3. In particular these problems, which were reported in July 2017, involved WebKit on iOS before 10.3.3, Safari before 10.1.2, iCloud before 6.2.2 on Windows, iTunes before 12.6.2 on Windows, and tvOS before 10.2.2.Vulnerability Trends Over Time

iCloud Keychain vulnerability

What has really raised eyebrows, however, is the issue involving the Keychain component. Some may already use Keychain or know that Apple lets users store their passwords and credit card details along with other information in Keychain Access, an app stored locally on the computer. If users have multiple devices, they can choose to synchronize passwords across all devices with iCloud Keychain. That, in theory, is supposed to be secure, as the data in iCloud Keychain is protected by encryption.How can I know if my password was stolen?

As discovered by Alex Radocea of Longterm Security Inc., however, a security flaw in iCloud Keychain failed to validate the authenticity of OTR packets. This issue allowed an attacker – able to intercept TLS connections – to read secrets protected by iCloud’s Keychain.

But actually this wasn’t the first security flaw affecting iCloud Keychain: in 2015 security researchers discovered two others:

  • CVE-2015-5836: Apple Online Store Kit in Apple macOS before 10.11 improperly validates iCloud keychain item ACLs, allowing attackers to obtain access to keychain items.
  • CVE-2015-1065: Multiple buffer overflows in iCloud Keychain in Apple iOS before 8.2 and Apple macOS through 10.10.2 allow man-in-the-middle attackers to execute arbitrary code.

Apple addressed every bug reported by security researchers and credited them for highlighting the issues.

More recently, in the fall of 2017, the launch of macOS High Sierra was overshadowed by a zero-day security flaw discovered in Keychain, the password manager of macOS. The code Wardle executed through an unsigned app he developed was able to retrieve passwords saved in Keychain in plane text, without requiring the admin password as it should.

Password managers prone to security flaws

We don’t read about security flaws related to Apple too often. There is one thing that needs to be kept in mind, though: the software is created by humans and even with the best developers in the team there is a slight chance that a bug can slip through.

The same goes for password managers. There was much buzz around the security flaws discovered in the most popular of these, including but not limited to LastPass and 1Password. But that doesn’t mean you should stop using them. It can be done, of course, on pen and paper, but that feels like living in the 19th century. What you can do to address such issues is to use the service wisely – since no software is hacker-proof – and keep an eye on any communications from the developers. If they fail to communicate with the users in cases of a security flaw or don’t patch the flaw quickly, then that’s a good sign that you need to change your password manager.


Best password managers of 2025

Editors' choice

RoboForm

Editor's rating:
Identifies weak, reused passwords
Future-ready, seamless logins
Easy to use
Budget-friendly
Families

LastPass

Editor's rating:
Logical interface
Automated password categorization
Advanced mobile version
Various two-factor authentication options
Businesses

1Password

Editor's rating:
Keeps your data fully private
Protects against unauthorized access
Protects against unauthorized access
One-time password support
Security features

Keeper

Editor's rating:
Protects against data breaches
Works on all major devices
Budget-friendly
Help when you need it
Personal use

NordPass Personal

Editor's rating:
Keeps data safe and encrypted
Creates strong, unique passwords
Great value at no cost
Affordable premium upgrade
Password sharing

Dashlane

Editor's rating:
Updates weak passwords quickly
Encrypts your online traffic
Easy migration from other tools
Full mobile functionality
Local storage

Enpass

Editor's rating:
Comprehensive password management
No cost on desktops
Full control of your data
Keeps your info fully secure

Discussions

Share your thoughts, ask questions, and connect with other users. Your feedback helps our community make better decisions.

©2012-2025 Best Reviews, a clovio brand – All rights reserved