Apple did not forget macOS Sonoma, macOS Sequoia and iOS 18 on patch day

macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, and iOS 18.7.5 updates are now available, extending security fixes to older Apple devices along with the company’s 26.3 releases.

Apple released the updates on February 11, along with macOS Tahoe 26.3, iOS 26.3, iPadOS 26.3, tvOS 26.3, watchOS 26.3, and visionOS 26.3. Security content pages for older branch releases show more CVE patches in shared system components.

None of these sites mention that the vulnerabilities are being actively exploited. Across all three platforms, Apple addressed overlapping issues in CoreAudio, CoreMedia, CFNetwork, kernel, Sandbox, Wi-Fi, and ImageIO.

  • CVE-2026-20611: CoreAudio memory corruption
  • CVE-2026-20609: CoreMedia denial of service or memory disclosure
  • CVE-2026-20660: Writing arbitrary CFNetwork
  • CVE-2026-20671: Kernel network interception vulnerability
  • CVE-2026-20621: Wi-Fi kernel memory corruption
  • CVE-2026-20628: Sandbox escape
  • CVE-2026-20634, CVE-2026-20675: ImageIO memory and data access issues

Older branches continue to receive security maintenance

Apple continues to support current and previous generations of operating systems through coordinated security releases. Shipping these fixes on the same day as cycle 26.3 reflects Apple’s practice of aligning fixes across platforms when shared frameworks are affected.

Mac users who stick with macOS Sonoma or Sequoia usually do so because their hardware can’t handle macOS Tahoe, or because their enterprise certification cycles prefer stability over quick upgrades.

Meanwhile, iPhone users on iOS 18 are still receiving security updates even though Apple has moved to iOS 26.

What users should know

If you’re using macOS Sonoma or Sequoia, you can install updates through System Settings under General and Software Update. For iPhone users, iOS 18.7.5 is available in the same location under Settings, General, and Software Update for supported models.

Apple always emphasizes the importance of keeping your devices updated to ensure security. The February 11 release shows that even if your device doesn’t have the latest major version, it’s still included in Apple’s active security patch cycle.

There is currently no indication that the vulnerabilities have been exploited.

Leave a Comment