Apple’s Sequoia macOS update leads to major compatibility problems with popular safety tools. It seems that users are faced with disturbances and frustration while suppliers are jostling to find solutions. Discover the affected software, potential circumvention solutions and the latest updates on this current problem.
Apple’s latest macOS update, macOS SequetOIA (version 15), would cause problems with the safety tools of the main suppliers like Crowstrike, Sentineone, Eset and Microsoft. The update seems incompatible with several popular safety tools, which makes them inoperable. The problem, which affects macOS users and companies, has caused the frustration of those working with macOS -focused safety tools.
For your information, Apple officially launched its macOS macOS focused on AI on Monday. It is a new operating system, Revealed for the first time on WWDC 2024Offering exclusive features such as Apple Intelligence, which uses Apple silicon to create language, images and actions on applications, taking advantage of the personal context of users.
However, the update has raised concerns for certain security products and applications such as several researchers and safety users on social networks, RedditAnd a Slack channel focused on Mac has reported problems with these safety tools after installing Sequoia.
On Mastodon, security researcher Will Dormann reported Problems linked to the firewall and DNS in MacOS Sequoia, noting that blocking incoming connections in the MacOS Sequoia firewall can also block responses to DNS requests, causing problems.
Dormann has also noted a related problem affecting browsers based on chrome and chrome on MacOS Sequoia, where the blocking of incoming connections for Google Chrome in the macOS firewall leads to important downloads.
Meanwhile, Apple has not yet responded to the concerns about Sequoia’s compatibility with security software such as Eset Endpoint Security and Crowstrike Falcon, and the complete scope of compatibility problems with Sequoia is not clear.
Most companies have advised users not to update the operating system as long as the problem is not solved, as they are unable to take care of MacOS Sequoia. Crowdstrike confirmed the problem and announced a delay in the support of Sequoia.
The company is waiting for Apple to publish a correction before updating its software. Likewise, eset recognized Network connection problems after update, but then said that their products are compatible with Sequoia.
While the initial sentry informed Users against upgrade to Sequoia, they then specified that the full support was available. However, some users have further reported problems with other features such as firewalls and DNS configurations.
A potential bypass Shared by security researcher Wacław Jacek on his blog is to use command lines to adjust the firewall parameters for specific applications. According to Jacek, to modify the firewall parameters, use the CLI / USR / LIBEXEC / ApplicationWall / SOCKETFILTWW tool.
This will allow your browser to access the Internet again, but other software may not work. To deactivate the entire firewall, open the terminal application, find the access path to your web browser, run LS -L and add your browser to the firewall to help / USR / LIBEXEC / Applicationfirewall / SOCKETFILTERFW.
Until the situation is resolved, please take care when you are considering the Sequoia update, especially if you are counting strongly on third -party security software.
Experts from experts
Mr. Mayuresh Dani, director, security research, at Qualification The threat research unit, has shared its concern about the situation with hackread.com declaring: “With the publication of new operating systems, all security suppliers must test and qualify their versions. This is a good thing that security suppliers have been proactive in this situation and have already sent measures to take in the event that their systems are faced with problems with the last Mac update. »»
Mayorsh stressed that “the appearance of this one, the networking battery – or the MacOS Sequoia firewall to be specific – has changed because the safety tools that use it to ensure safety cannot do so. Not just safety tools, VPNs also find it difficult to obtain a DNS resolution. »»
He also suggested the following to the security teams responsible for securing Mac:
- Avoid updating to MacOS Sequoia unless their security supplier has officially certified it to be used.
- Disable automobile versions on the main versions of the operating system before internal certification.
- Internal certify the new versions of the operating system by installing Dev and beta versions of operating systems with certified software before deployments at the organizational scale.
However, the importance of complete tests before deploying major updates in production environments should not be ignored. It also highlights the need for organizations to have appropriate backup plans and alternative security measures in place. The development of a multilayer security approach which is not based solely on a single tool or supplier can improve global stability.
Related subjects
- The Crowdsstrike update causes wreaking ravages by disturbing businesses
- Webroot has scored Facebook as a phishing site, Windows like Malware
- Apple has mistakenly approved hidden malicious software like Adobe Flash Player
- Microsoft publishes a tool to correct
- Microsoft Defender Flags Tor Browser like Win32 / Malgent! MTB MALWWARE