Updates to macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, and iOS 18.7.5 are now available, extending security fixes to older Apple devices alongside the company's 26.3 releases.
Apple released updates on February 11 along with macOS Tahoe 26.3, iOS 26.3, iPadOS 26.3, tvOS 26.3, watchOS 26.3, and visionOS 26.3. The security content pages for the older-branch releases show multiple CVE patches in shared system components.
None of these pages mention that the vulnerabilities were actively exploited. Across all three platforms, Apple addressed overlapping issues in CoreAudio, CoreMedia, CFNetwork, the kernel, Sandbox, Wi-Fi, and ImageIO.
- CVE-2026-20611: CoreAudio memory corruption
- CVE-2026-20609: CoreMedia denial-of-service or memory disclosure
- CVE-2026-20660: CFNetwork arbitrary file write
- CVE-2026-20671: Kernel network interception risk
- CVE-2026-20621: Wi-Fi kernel memory corruption
- CVE-2026-20628: Sandbox escape
- CVE-2026-20634, CVE-2026-20675: ImageIO memory and data disclosure issues
Older branches continue receiving security maintenance
Apple continues to support both current and previous operating system generations with coordinated security releases. Shipping these patches on the same day as the 26.3 cycle reflects Apple's practice of aligning fixes across platforms when shared frameworks are affected.
Mac users sticking with macOS Sonoma or Sequoia usually do it because their hardware can't handle macOS Tahoe, or because their enterprise certification cycles prefer stability over quick upgrades.
Meanwhile, iPhone users on iOS 18 are still getting security updates even though Apple's moved on to iOS 26.
What users should know
If you're using macOS Sonoma or Sequoia, you can install the updates through System Settings under General and Software Update. For iPhone users, iOS 18.7.5 is available in the same place under Settings, General, and Software Update on supported models.
Apple always stresses how important it is to keep your devices updated to ensure security. The February 11 releases show that even if your device isn't on the latest major version, it's still included in Apple's active security patch cycle.
At present, there's no sign that the vulnerabilities were exploited.





