BUG Mac OS
macOS 11 Big Sur introduced a lot of improvements to the Mac’s operating system, prompting the majority of Mac users to upgrade immediately as soon as it was released. But like all other new macOS versions, Big Sur comes with its own set of bugs and performance troubles.
Big Mac Usa Price
One of the common issues you might encounter involves your admin password. According to those who encountered this error, Big Sur does not recognize saved password on Macs. Even though the password is correct and it was originally recognised by the previous version of macOS, for some reason, Big Sur seems to have forgotten it and does not accept whatever password the user types in.
Apple quickly issued an update to iOS 7 and iOS 6, but took longer to issued an update for Mac OS X, despite Apple confirming that the same SSL/TSL security flaw was also present in OS X. Wardle told CyberScoop that “it has the potential to be the most impactful bug to everyday macOS users.” The issue existed due to a logic bug that made it so hackers could target users with malicious applications that bypass Apple ’s efforts to block bad applications, according to Wardle. Apple has also fixed the bug in Supplemental Updates made available for macOS Catalina 10.15.7 and macOS Mojave 10.14.6. The updates also include fixes for two bugs that could allow an app to.
Password Not Recognized After Upgrading to Big Sur
If you’ve just updated but you cannot unlock Mac after updating to Big Sur, then you are not alone. A lot of Mac users have also complained about this macOS Big Sur password bug that prevents them from accessing their system settings or making changes to their preferences. Although the admin account password entered is correct, it does not seem to work. In some cases, the users also get the following error message: No users available for authorization.
In other scenarios, the computer freezes on the password authentication screen and the spinning wheel keeps on spinning in a loop.
Pro Tip: Scan your Mac for performance issues, junk files, harmful apps, and security threats
that can cause system issues or slow performance.
Special offer. About Outbyte, uninstall instructions, EULA, Privacy Policy.
This error has been around during the beta testing process and it looks like the macOS Big Sur Password bug has found its way to the public release. According to the release notes Apple provided to fix this error, users just need to reset the password and everything will be okay. Unfortunately, this does not work for most users and even the new password gets rejected every time.
What Causes the macOS Big Sur Password Bug?
It seems like the update to macOS Big Sur has caused the affected Macs to forget which accounts have administrator privileges. What this means is that macOS won’t accept your password, even though it is correct, when you try to change System Preferences, install new apps, or perform other admin-level actions.
After typing in your password, you will notice that the password box shakes as if you entered the wrong password. The same thing happens no matter how you carefully type in your password or even if you reset it.
If this error has been causing you much worry ever since the upgrade, then this guide should be able to save you from the stress. We’ll discuss several steps you can take if you cannot unlock Mac after updating to Big Sur or if your password is not being recognized.
What To Do If Big Sur Does Not Recognize Saved Password
If you’re experiencing the macOS Big Sur password bug, the first thing you need to do is restart your Mac because it might be a temporary problem. Make sure you shut down your computer completely before turning it on again. Next, type in your password to see if macOS will accept it now.
Make sure to clean up your Mac as well using a Mac cleaner to prevent other issues from triggering this bug. If nothing seems to work, proceed to the steps below and try them one by one until you resolve the error.
Step 1. Update macOS.
If you’re sure that you typed in your password correctly, the only reason your Mac won’t accept it is due to a bug, which is relatively common with new software updates. Apple usually releases a patch update after a couple of weeks to fix the most problematic bugs. To check if Apple has already released a patch update that addresses this error, try to update your operating system to the latest version. This allows you to benefit from the latest bug fixes and hopefully resolve any password issues you are experiencing in macOS Big Sur.
To update your Mac:
- Go to the Apple menu in the upper left corner of the menu bar.
- Click on System Preferences and select Software Update.
- Your Mac automatically checks for new updates.
- Download and install any updates that are available.
Step 2. Reset SMC.
The system management controller or SMC is used by Intel-based Mac computers and is responsible for tasks related to passwords, power supply, battery, fans, and other Mac features.
A lot of affected users found that resetting the SMC was effective in resolving the macOS Big Sur password bug, so it should be one of the solutions you should try. You don’t have to worry because you won’t lose any data when you reset the SMC, and it only takes a minute to perform. The method to reset the SMC differs depending on the type of Mac you are using.
If your Mac has a T2 security chip, here’s how to reset the SMC:
- Shut down your Mac by going to Apple menu > Shut Down. Wait for your Mac to complete turning off.
- Press and hold the Power button for at least 10 seconds.
- Your Mac should remain turned off. If it powered back on, shut it down again from the Apple menu.
- On your MacBook:
- Press and hold the Left Control + Left Option + Right Shift buttons.
- Keep holding these buttons for seven seconds, then press and hold the Power button.
- Keep holding all buttons for another seven seconds, then release them altogether.
- Press the Power button to reboot your Mac.
- On your iMac:
- Disconnect the power cable for at least 15 seconds.
- Reconnect the power cable and wait for five seconds.
- Press the Power button to reboot your Mac.
How to reset the SMC if your Mac has no T2 security chip:
- Shut down your Mac by going to Apple menu > Shut Down. Wait for your Mac to complete turning off.
- On a MacBook with a removable battery:
- Remove the battery from your MacBook.
- Press and hold the Power button for at least five seconds.
- Release the power button and reconnect the battery.
- Press the Power button again to reboot your MacBook.
- On a MacBook without a removable battery:
- Press and hold the Left Shift + Left Control + Left Option buttons.
- Keep holding all buttons, then press and hold the Power button.
- After 10 seconds, release all the keys at the same time.
- Press the Power button again to reboot your MacBook.
- On an iMac:
- Unplug the power cable for at least 15 seconds.
- Reconnect the power cable and wait for five seconds.
- Press the Power button again to reboot your Mac.
Step 3. Reset the Admin Account.
Big Mac Salad
If macOS Big Sur keeps on rejecting passwords because it forgets which users are administrators, then you can use a command via Terminal to create a new administrator account.
You can then use this new account to assign administrator privileges to your original admin account. After getting back your admin access, you can then delete the new account you created.
To use this Terminal command, you need to restart your Mac into Recovery mode first by following the steps below.
- Open Finder and remember the name of your startup drive in the Locations section of the sidebar. This should be Macintosh HD by default.
- Shut down your Mac by going to Apple menu > Shut Down. Wait for your Mac to complete turning off.
- Hold down Command + R while pressing the Power button to boot your Mac in Recovery mode.
- Once the macOS Utility window appears, click Utilities > Terminal from the menu bar.
- Type the following Terminal command: rm “/Volumes/Macintosh HD/var/db/.applesetupdone.
- Replace Macintosh HD with the name of your startup drive, then press Enter.
- Follow the on-screen instructions to create a new user account.
- Sign into the new account, then go to Apple menu > System Preferences > Users & Groups.
- Click the lock icon and use your new admin password to make changes.
- Choose your original account and tick off the Allow user to administer this computer option.
- Now sign back in using your original account and delete the new account from Apple menu > System Preferences > Users & Groups.
You should now be able to use your original admin account to make changes to macOS Big Sur.
Summary
The macOS Big Sur password bug has affected a significant number of Mac users, preventing them from making changes to the settings and performing admin-level tasks. If you’re faced with this issue, don’t panic. The steps above should help you recover your account’s admin privileges and resolve any password problems you are experiencing with Big Sur.
See more information about Outbyte and uninstall instructions. Please review EULA and Privacy Policy.
Apple Mac users are being urged to update to macOS Big Sur 11.3, released today, which patches a “massively bad” vulnerability that could allow malware to bypass layered protections built into the operating system.
The bug was uncovered by security researcher Cedric Owens, who reported it to Apple.
In a long technical blog post, fellow security researcher Patrick Wardle said the bug “trivially bypasses many core Apple security mechanisms, leaving Mac users at grave risk” and that “malware authors are already exploiting it in the wild as an 0day”.
The bug was given the common vulnerabilities and exposures (CVE) reference CVE-2021-30657 in Apple security notes, where it is described as a “logic issue” that could allow “a malicious application [to] bypass Gatekeeper checks”.
Gatekeeper was introduced in OSX Lion (10.7) as an added layer of protection when users downloaded executables from the internet.
It is one of three such protections built into macOS, all of which are intended to alert users about files downloaded from the internet, and to prevent malware writers from tricking users into infecting their machines.
However, Wardle noted, the bug discovered by Owens allowed an attacker “to trivially and reliably bypass all of these foundational mitigations”, without generating any system prompts that would warn the user something was amiss.
A proof-of-concept showed an app could be disguised as a document and “allowed to launch with no prompts nor alerts”.
“Since 2007, Apple has sought to protect users from inadvertently infecting themselves if they are tricked into running such malicious code. This is a good thing as sure, users may be naive, but anybody can make mistakes,” Wardle wrote.
“Unfortunately due to subtle logic flaw in macOS, such security mechanisms were proven fully and 100 percent moot, and as such we’re basically back to square one.
“We started with an unsigned, unnotarised, script-based proof-of-concept application that could trivially and reliably sidestep all of macOS’s relevant security mechanisms (File Quarantine, Gatekeeper, and Notarization requirements) …even on a fully patched M1 macOS system.
Big Surf Mac Os
“Armed with such a capability macOS malware authors could (and are) returning to their proven methods of targeting and infecting macOS users.”
Mac security firm Jamf said in a separate blog post that it had located Shlayer malware already exploiting the bug.
“To make the situation more urgent, the Jamf Protect detections team observed this exploit being used in the wild by a variant of the Shlayer adware dropper,” it said.
“The variant has been repackaged to use a format necessary for carrying out the Gatekeeper bypass vulnerability.
“The Jamf Protect detection team identified samples found to be abusing this vulnerability as early as January 9, 2021.
“Shlayer continues to reintroduce itself with innovative ways to infect macOS-based systems.”
Jamf said that when malware exploiting the bug is launched on computers running Big Sur 11.3, “the user will see a pop-up message stating that the software ‘cannot be opened because the developer cannot be identified.’
“Since the malicious application is not notarised or signed with a valid developer’s certificate, the message will prompt the user to eject the mounted DMG containing the app bundle,” it added.
Owens praised Apple's quick response to patching the flaw.
'Kudos to Apple for rolling out a fix in Big Sur 11.3 beta 6 literally five days after I reported to them,' he wrote.
'The product security team at Apple was very responsive anytime I reached out with an inquiry.
'I highly encourage you to update to Big Sur 11.3 soonest, as the fix has been applied ... so that Gatekeeper now properly blocks this payload on macOS 11.3.'