Note Apple specifically states that the update is available for download now, and “from that date, it will be automatically installed on all systems running the latest version of MacOS High Sierra (10.13.1).” This seems to suggest that Apple is trying to push a critical security update to customers using the automatic security update mechanism available through the Mac App Store. We are reviewing our development processes to prevent this from happening again. and will be automatically installed later this day on all systems with the latest version of MacOS High Sierra ( We strongly apologize for this error and apologize to all Mac users, both for releasing this vulnerability and for the concern it causes. This morning, the update will be available for download from 8 a.m. “When security engineers found out on Tuesday afternoon, we immediately started working on an update that closes the security hole.
“Security is a top priority for every Apple product, and unfortunately we stumbled upon this macOS release.”
You can also check the build number of a Mac OS publication using a terminal and the following command syntax:Īccording to tweets from TechCrunch vendor Mathew Panzarino, Apple has released the following statement about the security vulnerability and the security update for macOS High Sierra: In the sample screenshot, the build version of macOS High Sierra is older than 17B1002, so the security patch has not yet been installed.
When you install security update 2021-001 on your Mac, the macOS build number is 17B100 Learn how to find the macOS version and build number on your Mac.
The aim was to improve the verification of identification data. Impact: An attacker may have been able to bypass administrator authentication without providing an administrator passwordĭescription: A logical error occurred while checking the credentials. No effect: macOS Sierra 10.12.6 and older