Firmware password check does not work on Apple Silicon-based machines. #266

Closed
opened 2026-01-19 18:29:52 +00:00 by michael · 2 comments
Owner

Originally created by @grismemj on GitHub.

Summary

The existing check for a firmware password fails on Apple Silicon-based Macs.

Steps to reproduce

sudo firmwarepasswd -check returns

ERROR | SetupTRBSettings | The firmware on this machine is not supported.

on Apple Silicon-based hardware.

Operating System version

11.6.2

What is the current bug behavior?

sudo firmwarepasswd -check returns

ERROR | SetupTRBSettings | The firmware on this machine is not supported.

and the rule fails.

What is the expected correct behavior?

There is no firmware password on Apple Silicon hardware, so the rule should not fail. It should detect the hardware and always pass for Apple Silicon hardware.

Relevant logs and/or screenshots

(Paste any relevant logs - please use code blocks (```) to format console output, logs, and code as it's tough to read otherwise.)

Output of checks

(Paste any output that occurs with the bug)

Possible fixes

Check the hardware, and only run the firmwarepasswd -check on Intel, otherwise just return 1.

[[ uname -m == "x86_64" ]] && /usr/sbin/firmwarepasswd -check | /usr/bin/grep -c "Password Enabled: Yes" || echo 1

Originally created by @grismemj on GitHub. <!--- Please read this! Before opening a new issue, make sure to search for keywords in the issues filtered by the "regression" or "bug" label and verify the issue you're about to submit isn't a duplicate. ---> ### Summary The existing check for a firmware password fails on Apple Silicon-based Macs. ### Steps to reproduce sudo firmwarepasswd -check returns ERROR | SetupTRBSettings | The firmware on this machine is not supported. on Apple Silicon-based hardware. ### Operating System version 11.6.2 ### What is the current *bug* behavior? sudo firmwarepasswd -check returns ERROR | SetupTRBSettings | The firmware on this machine is not supported. and the rule fails. ### What is the expected *correct* behavior? There is no firmware password on Apple Silicon hardware, so the rule should not fail. It should detect the hardware and always pass for Apple Silicon hardware. ### Relevant logs and/or screenshots (Paste any relevant logs - please use code blocks (```) to format console output, logs, and code as it's tough to read otherwise.) ### Output of checks (Paste any output that occurs with the bug) ### Possible fixes Check the hardware, and only run the firmwarepasswd -check on Intel, otherwise just return 1. [[ `uname -m` == "x86_64" ]] && /usr/sbin/firmwarepasswd -check | /usr/bin/grep -c "Password Enabled: Yes" || echo 1
Author
Owner

@0xmachos commented on GitHub:

For the equivalent level of security on a Mac with Apple Silicon, simply turn on FileVault.

via Set a firmware password on your Mac

@0xmachos commented on GitHub: > For the equivalent level of security on a Mac with Apple Silicon, simply turn on FileVault. via [Set a firmware password on your Mac](https://support.apple.com/en-gb/HT204455)
Author
Owner

@brodjieski commented on GitHub:

While we do include a note about applicability in the os_firmware_password_require rule, we also tag the rule with a -i386 tag to indicate that is should only apply to Intel based systems. This tag should be referenced when creating the compliance script, however, there is currently a bug with generate_guidance.py that needs to be addressed.

@brodjieski commented on GitHub: While we do include a note about applicability in the os_firmware_password_require rule, we also tag the rule with a -i386 tag to indicate that is should only apply to Intel based systems. This tag should be referenced when creating the compliance script, however, there is currently a bug with generate_guidance.py that needs to be addressed.
Sign in to join this conversation.
No Label
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: usnistgov/macos_security#266