Disable csrutils: |
Startup -> Cmd + R -> terminal -> `csrutil disable;reboot` |
Download and install mobile partner: |
http://download-c1.huawei.com/download/downloadCenter?downloadId=90143&version=352019&siteCode=worldwide |
Create profile and connect. |
- Mobile Partner for macOS 10.12 - 10.13 Sierra & High Sierra (ZIP dokument, 21190 kB) Mobile Partner for macOS 10.10 - Yosemite (ZIP dokument, 11004 kB).
- Installing Huawei E3372 On macOS 10.12 Sierra And macOS 10.13 High Sierra A Huawei E3372 / Telekom Speedstick LTE V mobile broadband modem USB stick is easily installed on macOS 10.12 Sierra and macOS 10.13 High Sierra without using Mobile Partner software and despite Apple’s System Integrity Protection ‘csrutil’.
commented Apr 26, 2018
In this Huawei Mac article you can find how to install Huawei driver in mac os x.I have used driver version 4.15.00.00 which supports MAC OS X 10.6 Snow Leopard, all the description are also applicable to the newer version of the driver. Macos sierra free download - Sierra Wireless MC5720 Device, Sierra Wireless EDGE Adapter, Sierra Wireless GPRS Adapter, and many more programs.
Thanks a lot. It works!. |
commented Jan 7, 2019
Also it seems like Huawei have removed Mobile Partner for Mac from their site (I can't find it through the search anymore), but your link still works (I think it's a version from somewhere about Sierra release time (2016)). |
commented Jan 11, 2021
Good post to see: https://retifrav.github.io/blog/2019/04/17/huawei-e3372-macos/ |
The Internet is abuzz with the shocking revelation that now everyone can hack an Apple computer… as long as it’s using the latest macOS High Sierra operating system. Let us explain what’s going on, and share with you the workaround for the macOS High Sierra root bug.
Updated @ 2017-11-30 : Added a new section on the Apple bug fix (Security Update 2017-001) [1], and additional information on the root bug [2].
Originally posted @ 2017-11-29
If you are the primary user of a MacOS X system, you have an administrator account with administrator privileges. This gives you more privileges and access than a standard user account. However, that is not the highest access level possible.
There is a Mac superuser account called “root” that gives you elevated read and write privileges to hidden or protected areas of the system. With the Mac root user account, you can even access files in other user accounts.
In fact, it gives you such God-like powers, you can modify or even delete critical system files. In fact, a Mac root user can use the rm -rf * command to delete the contents of every mounted drive in the computer, until macOS crashes when a crucial file or folder is deleted.
So this Mac root user account should only remain disabled unless you really, REALLY need to use it.
Suggested Reading :The Mac Root User Login & Password Guide
On Tuesday, 28 November 2017, Turkish software developer Lemi Orhan Ergin revealed the macOS High Sierra root bug. With a few simple steps, anyone can gain elevated root user privileges in any computer running macOS High Sierra! Here is a summary of what we know about the root bug :
- The root bug exploit requires a computer running macOS High Sierra, with multiple user accounts.
- When prompted for a username and password, use these steps to gain root user access without any password :
- Type “root” as the username and leave the password field blank.
- Just click “Unlock” twice.
- The root bug cannot be exploited remotely, unless screen sharing is enabled.
- The root bug was introduced in macOS High Sierra 10.13.1. Earlier versions of macOS were not affected.
- Apple confirmed that the bug was due to “a logic error… in the validation of credentials“.
- Apple also confirmed that the bug would allow an attacker to “bypass administrator authentication without supplying the administrator’s password“.
- Several security researchers successfully replicated the bug.
????☠️ pic.twitter.com/4TBh5NetIS
— patrick wardle (@patrickwardle) November 28, 2017
Just tested the apple root login bug. You can log in as root even after the machi was rebooted pic.twitter.com/fTHZ7nkcUp
— Amit Serper (@0xAmit) November 28, 2017
The macOS High Sierra root bug is EXTREMELY serious, because it allows a hacker to easily bypass all of the macOS operating system’s security protections.
It doesn’t matter if you encrypted your computer, and secured it with an extremely long and complex password. Anyone who gains root user privileges using this bug can access (read, copy or move) the files in any user account (even those of an administrator) without knowing the password.
What’s even more troubling is that the root bug works even with a disabled root user account. This means the vast majority of Apple computers running on High Sierra are compromised, as the root user account is disabled by default.
Unlike other security researchers, Lemi Orhan Ergin did not forewarn Apple before publicly revealing the bug, on Twitter no less. He basically exposed a zero-day vulnerability for hackers to use, while Apple rushes to fix the bug.
1. Install macOS Security Update 2017-001 New!
Apple just released Security Update 2017-001. This update will remove the root bug and improve credential validation. INSTALL THIS UPDATE NOW!
Note : This bug fix will reset and disable the root user account. If you need to use the root user account, you will need to re-enable it, and change its password, after applying the update.
Note : Apple rushed out this update so quickly that they accidentally used a space instead of the version number. You can read more about this in our article – Apple Rushed Out macOS Root Bug Fix & It Shows…
This is not an issue if you are downloading the patch through the App Store. But if you’re applying the patch via Terminal, you need to add a space.
2. Enable Root User With Your Own Password
[adrotate group=”2″]If you cannot apply Apple’s bug fix yet, you can block this root bug by enabling the root user account, and setting a password for it.
It’s not so straightforward, so we created a step-by-step guide for you – The Mac Root User Login & Password Guide.
3. Use Additional Encryption
Alternatively, you can opt to move your sensitive data to encrypted containers or drives using third-party encryption utilities like VeraCrypt. Hackers may use the High Sierra root bug to gain access to the encrypted containers or drives, but without the correct password, the actual data won’t be accessible.
4. Physically Protect Your Apple Computer
The good news is the High Sierra root bug generally requires physical access to your Apple computer. Until this bug is fixed, you should make sure your Apple computer is never left unsupervised.
Keep it in a locked room or bag, whenever you are not using it. If no one can get to it, they cannot use the bug to gain root access.
Huawei Mobile Partner Windows 10
5. Disable Screen Sharing
The High Sierra root bug can be exploited remotely if Screen Sharing is enabled. So make sure you disable Screen Sharing.
Go Back To >Articles | Home
Huawei Mobile Partner Pc
If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!