Apple Device Update Log

Want to know more about the updates required for your W&L-owned Mac device?

An ongoing summary can be found in our Apple update log below.

Updates to Apple products occur routinely to patch vulnerabilities, improve system integrity and stability, and mitigate zero-day exploits, including high-priority emergency fixes. W&L uses Nudge, an open-source tool developed by MacAdmins (and supported by universities across the country), to encourage macOS users to update their systems.


Employees can help by following these Best Practices:

Enable Automatic Updates
This ensures that security patches and app updates are installed without delay.

Manually Check Periodically
Even with automatic updates enabled, periodically check for updates-especially after hearing about a known threat.

Prioritize Security Updates
Apply any update labeled "security" as soon as possible, even if you choose to delay feature updates.

Restart Devices Regularly
Some updates require a restart to complete installation. If your device is always in "sleep mode," the update might not finish.


Apple Device Update Log​

These updates are part of Apple's ongoing efforts to enhance security and stability of the macOS. It's important to regularly install these updates to protect your system against known vulnerabilities. For W&L-owned devices, utilizing tools like Nudge can help ensure timely updates and compliance with security best practices.​

If you need assistance with updating your Mac or have questions about these updates, please contact the ITS Helpdesk at x4357 or help@wlu.edu.


Coming Soon:

ITS will be deploying antivirus protection to all university owned Mac computers in early 2026.

Apple's newest operating system, macOS Tahoe 26, is now available for all university-owned machines.


Scheduled Updates:

macOS Nudge Event: 12/3/2025-12/17/2025
Critical Security Updates for Google Chrome: 12/3/2025

macOS Ventura (13.7.8) is no longer receiving security updates. Therefore, users must upgrade to a supported macOS version at this time.


Completed Updates:

macOS Tahoe 26.1
Release Date: 11/3/2025
Major security-update fixing ~90 vulnerabilities including issues allowing apps to access sensitive user data (CVE-2025-43471, CVE-2025-43322), take screenshots of embedded views (CVE-2025-43455), cause kernel memory corruption (CVE-2025-43447, CVE-2025-43462), and downgrade code-signing bypasses on Intel Macs (CVE-2025-43390).

macOS Sequoia 15.7.2
Release Date: 11/3/2025
Focused on security fixes: access-and-sandbox bypasses (e.g., logic issue allowing access to sensitive data CVE-2025-43322), downgrade/permission issues in AppleMobileFileIntegrity (CVE-2025-43390, CVE-2025-43468), symlink validation flaws (CVE-2025-43379), and sandbox escapes (CVE-2025-43476).

macOS Sonoma 14.8.2
Release Date: 11/3/2025
Addresses ~46 security issues: entitlement bypasses (CVE-2025-43411), symlink validation flaws (CVE-2025-43446, CVE-2025-43379), sandbox escapes (CVE-2025-43476), path-parsing/traversal issues (CVE-2025-43382), and more.

macOS Tahoe 26.0.1
Release Date: 9/29/2025
Security update addressing early issues in 26.0, including bug fixes and important security patches.

macOS Sequoia 15.7.1
Release Date: 9/29/2025
Includes a security fix for a font-parser out-of-bounds write vulnerability (CVE-2025-43400).

macOS Sonoma 14.8.1
Release Date: 9/29/2025
Fixes a font-parser out-of-bounds write vulnerability (CVE-2025-43400).

macOS Tahoe 26.0
Release Date: 9/15/2025
Initial major release of Tahoe; includes foundational security updates addressing 77+ vulnerabilities according to coverage.

macOS Sequoia 15.7
Release Date: 9/15/2025
Fixes a range of vulnerabilities including a symlink-based privacy bypass (CVE-2025-43288), a buffer overflow in AMD support (CVE-2025-43312), and a restriction update blocking unsigned services launching on Intel Macs (CVE-2025-43321).

macOS Sonoma 14.8
Release Date: 9/15/2025
Includes important bug fixes and security updates (~39 vulnerabilities), e.g., unsigned services launching blocked on Intel Macs via AppKit.