Skip to content
Thoughtful, detailed coverage of everything Apple for 33 years
and the TidBITS Content Network for Apple professionals
26 comments

Apple Releases iPadOS 14.7.1 and macOS 11.5.1 with Security Notes for Recent OS Updates

Apple usually updates all of its operating systems at once. So it was unusual when the company released iOS 14.7, watchOS 7.6, HomePod Software 14.7, and tvOS 14.7 without iPadOS 14.7 and macOS 11.5 Big Sur (see “iOS 14.7 Adds Support for the MagSafe Battery Pack,” 19 July 2021). And since Apple doesn’t release security notes until all affected operating systems are updated, those updates were a mystery. Apple pushed out iPadOS 14.7 and macOS 11.5, along with security notes for all of last week’s releases.

iOS 14.7.1 release notes

Following the release of iPadOS 14.7 and macOS 11.5, Apple abruptly pushed out iOS 14.7.1, iPadOS 14.7.1, and macOS 11.5.1 with a fix for the Apple Watch not unlocking iPhones and an important security fix.

You can install iOS 14.7.1, which is 126 MB on an iPhone 11 Pro, in Settings > Software Update.

iPadOS 14.7.1

There is only one thing to say about iPadOS 14.7 that we didn’t already cover in “iOS 14.7 Adds Support for the MagSafe Battery Pack” (19 July 2021): Apple fixed an audio-skipping bug when using USB-C to 3.5mm headphone adapters. The follow-up iPadOS 14.7.1 release adds an important security fix. We’ll cover security notes for all releases below.

iPadOS 14.7 release notes

You can install the iPadOS 14.7.1 update, which clocks in at 847.6 MB on a third-generation iPad Air (assuming you haven’t yet updated to iPadOS 14.7, which is also 847.6 MB) in Settings > General > Software Update.

macOS 11.5.1

The macOS 11.5 update, like the iOS and iPadOS updates, updates the Podcasts app so you can view either all shows or only those you follow in the Library tab. It also fixes bugs that prevented Music from updating the play count and last played date in your library and prevented smart card authentication from working on M1-based Macs.

macOS 11.5 release notes

Howard Oakley has some other details about macOS 11.5, such as new versions of core apps and included firmware updates.

You can install the 2.93 GB (reportedly 3.8 GB on M1-based Macs) update for macOS 11.5.1 in System Preferences > Software Update.

Security Notes for Current OS Versions

These updates address some serious security vulnerabilities. In particular, the iOS and iPadOS updates include this note for Wi-Fi: “Joining a malicious Wi-Fi network may result in a denial of service or arbitrary code execution.” We presume that’s a fix for the Wi-Fi bug that could cause maliciously named access points to disable Wi-Fi on an iPhone or iPad (see “Obscure Bug Could Disable the %p%s%s%s%s%n Wi-Fi on Your iPhone or iPad,” 7 July 2021). We knew the vulnerability could cause Wi-Fi to stop working, but from Apple’s notes, it seems like a potential vector for malware as well.

Here are the security notes and number of vulnerabilities fixed in each version (many of which are common across all the operating systems):

The follow-up iOS 14.7.1, iPadOS 14.7.1, and macOS 11.5.1 updates address a kernel vulnerability that Apple says may have been actively exploited in the wild. That’s extremely consequential and reason enough to install these updates as soon as you can.

Subscribe today so you don’t miss any TidBITS articles!

Every week you’ll get tech tips, in-depth reviews, and insightful news analysis for discerning Apple users. For over 33 years, we’ve published professional, member-supported tech journalism that makes you smarter.

Registration confirmation will be emailed to you.

This site is protected by reCAPTCHA. The Google Privacy Policy and Terms of Service apply.

Comments About Apple Releases iPadOS 14.7.1 and macOS 11.5.1 with Security Notes for Recent OS Updates

Notable Replies

  1. Does anyone know if this closes the “Pegasus” vulnerabilities in iMessage?

  2. There is no mention of it in Security Notes and it would be shocking to see that Apple could react to a 0-day in such record time.

  3. I would need a lot more information before deleting “suspicious” files manually. The article advises to use up-to-date virus/malware checking software.
    I use ClamX but am not sure if it currently covers this issue.
    I wonder if the latest Catalina/Mojave updates are relevant?

    " LaunchServices
    Available for: macOS Mojave
    Impact: A malicious application may be able to break out of its sandbox…"
    It’s a 1.7gB download for Mojave.

  4. TL;DR: It’s a good idea to review your system’s Launch Agents, but look closely at them before deleting anything because they may be perfectly innocent, even if there’s a big scary file name.

    For instance, I’ve got one called com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae.plist.

    At first glance, that looks really suspicious, since it’s got a huge string of hex digits as a part of the name. But if you open it up and read the contents you find:

    $ cat com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae.plist
    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
    	<key>Label</key>
    	<string>com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae</string>
    	<key>ProgramArguments</key>
    	<array>
    		<string>/Applications/Adobe Reader.app/Contents/MacOS/Updater/Adobe Reader Updater Helper.app/Contents/MacOS/Adobe Reader Updater Helper</string>
    	</array>
    	<key>RunAtLoad</key>
    	<true/>
    	<key>StartInterval</key>
    	<integer>12600</integer>
    </dict>
    </plist>
    

    Note the contents of the ProgramArguments key. This identifies the app that will be launched. In this case, it’s the “Adobe Reader Updater Helper.app” that is contained within the Adobe Reader app.

    The “RunAtLoad” key is set to true, meaning it will run this when I log in.

    The “StartInterval” is set to 12600 seconds (3.5 hours), which means it will re-run itself about once every 3.5 hours. Which is reasonable for a major app to check for updates.

    The important thing is that, despite the scary looking file name, this specific Launch Agent is perfectly innocent. (Assuming you actually installed Adobe Reader, of course).

    Note also that the mere presence of a Launch Agent doesn’t necessarily mean anything will actually run. The system launcher will still depend on the file’s contents to determine that.

    For example, iMazing has one for launching it’s iMazing Mini menu-bar app when you log in. I have disabled the feature (via its preferences), but the Launch Agent file (com.DigiDNA.iMazing2Mac.Mini.plist) still exists. But note the contents:

    $ cat com.DigiDNA.iMazing2Mac.Mini.plist 
    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
    <plist version="1.0">
    <dict>
    	<key>KeepAlive</key>
    	<false/>
    	<key>Label</key>
    	<string>com.DigiDNA.iMazing2Mac.Mini</string>
    	<key>ProcessType</key>
    	<string>Interactive</string>
    	<key>ProgramArguments</key>
    	<array>
    		<string>/Applications/iMazing.app/Contents/MacOS/iMazing Mini.app/Contents/MacOS/iMazing Mini</string>
    	</array>
    	<key>RunAtLoad</key>
    	<false/>
    	<key>ThrottleInterval</key>
    	<integer>10</integer>
    </dict>
    </plist>
    

    Specifically, note the “RunAtLoad” key whose value is set to false. In other words, the system won’t be launching anything in this file.

    In other words, yes, go review the Launch Agents in your system and if something looks like malware, then delete it. But look closely at the contents to make sure it isn’t something innocent.

  5. Although there are over 17,000 signatures for XLoader files in ClamXAV, I can only verify that they do not appear to look for that specific file name, but might be able to identify it by other means. I don’t have a sample yet of that specific component of the infection so can’t fully check for it, but I will return once I’ve been able to get a more definitive answer. I also checked DetectX Swift and Malwarebytes, neither of which are looking for it presently.

    Security Updates never look for malware, they only patch vulnerabilities. XProtect and MRT updates cover malware.

    XLoader and it’s predecessor trace it’s roots back to 2003 and is mostly been sold to adware agents. The two big deals about this new variant are that the same code can be used against both Windows and Macs (since around December of last yea) & that it is now distributed embedded in a Word document which can be sent as a message attachment. I don’t know that any purchaser has actually used it to steal information off a Mac as that isn’t usually a big moneymaker.

  6. One other thing I should have mentioned. Java is need in order to install this version of XLoader and most users will not have it since it hasn’t been included in macOS since Snow Leopard and very few 3rd party apps still require it. If you don’t have a Java prefs pane in System Preferences and are not still running SL then look no further for this one. Another check would be this Terminal Command:

    java -version.

  7. We’ve updated this article with details on iOS 14.7.1, iPadOS 14.7.1, and macOS 11.5.1.

  8. says 14.7.1 fixed unlocking the watch for phones with touch id. someone failed to test that: my phone with face id no longer unlocks my watch. apple quality once again …

  9. I’d try restarting the watch and phone and see if that fixes it; it’s working fine for me on iPhone X (14.7.1) and Series 5 (7.6).

  10. That was one of the primary stated improvements! How could that have been missed in testing?

  11. With respect to Apple quality.
    I have to wonder if it is the quality of the input or the quality of the trainers or training materials.

    I spent a lot of time on nuclear submarines - training was essential - so was personnel input. As CO I was responsible for the overall product and it required attention - but we got good sailors and training materials - and we were well-trained ourselves. The downside of an error could be pretty steep.

    I’ve noticed in interactions with Apple (user since ’84) that in the last few years the first-line support is not even close to what it had been. Escalating is sometimes helpful.

    So, I wonder if Apple management has taken their eye off the ball - or its just becoming very hard to get their trainees up to speed.

    David

  12. Let’s not turn the discussion of these latest updates into yet another general anecdotal conversation on Apple quality.

    Obviously, iOS 14.7.1 doesn’t break iPhone unlocking from the Apple Watch for all Face ID-equipped iPhones because it works fine for @ddmiller. I’m curious if his suggestion of restarting the iPhone and Apple Watch resolves it or not for @henry.crun.

  13. I can tell you that iOS 14.7.1 makes no difference with my Apple Watch 4 and iPhone 12 Pro with Face ID. My iPhone still takes 3-4 (or more) tries to unlock my watch even after restarting them both. They worked perfectly before iOS 14.7

  14. Interesting! I’ve confirmed that both unlocking the Apple Watch from the iPhone and unlocking the iPhone from the Apple Watch work on my iPhone 11 Pro with iOS 14.71 and Apple Watch Series 5 with watchOS 7.6.

    I don’t know if it was just me being impatient, but I did seemingly have to restart the watch and the iPhone before the iPhone would unlock the watch. In two tries before I restarted, I’d get the little Unlocking Apple Watch alert at the top of the iPhone screen, but it would go away before saying Unlocked (and the watch would stay locked).

  15. tried the reboot of both devices. the phone still does not unlock the watch. tried multiple times in case it’s just pilot error. nope: error appears to be in apple engineering.
    phone is a 12m. watch is an s5.

  16. @applesupport suggested toggling “unlock with phone” in the watch app. did that. no resolution. phone still fails to unlock the watch.
    note that the watch will unlock the phone if my mug is masked. bluetooth and the connection between the devices is sorta working.

  17. Unlocking my iPhone XR with my Apple Watch 6, running iOS 14.7.1 and WatchOS 7.6 does not work. It used to work every time, until I installed iOS 14.7, and it still refuses to work with 14.7.1.

  18. I’ve read a few people who were having issues with unlocking the watch (both intermittently and always) with a FaceID iPhone on 14.7.1 had it resolved by un-pairing and re-pairing the watch to the phone.

  19. Apparently there is a similar fix needed for watchOS which was very briefly posted today as watchOS 7.6.1 (18U70), but then quickly removed without explanation.

  20. I can confirm that iOS 14.7.1 fixes the bad CarPlay connection, so once again my iPhone connects right away with my Mazda CX-5.

    CarPlay hasn’t worked at all for at least a month, since I think the 14.6 update.

  21. @applesupport suggested wiping and reinstalling the watch. nix that. i can enter its passcode when i put the thing on. they’ll break something else when the next ios14/watchos7 dot release drops but will maybe fix whatever 14.7.1 broke.

    must keep the faith, brethren.

    btw: at some point a couple of days ago, the phone unlocked the watch. no idea how that worked. it’s declined to repeat the trick.

  22. installed watchos 7.6.1 last night. the phone unlocked the watch this morning.

  23. I wouldn’t blame it on the 14.7.1 update specifically, but I have had a similar issue at last three times now (perhaps since 14.5?).

    In each instance, it happened after I had lost connection to the cellular network (coverage is bad back at the end of the canyon). Once back in an area where I always had reception, my iPhone 12 mini simply refused to reconnect to the T-Mobile network. Surprisingly, going into Airplane Mode for a minute or so and back did not change anything about the phone’s inability to rejoin the cellular network. What it ultimately took was rebooting the phone.

    And now that I think about it, I also remember it happened once at SFO airport when coming back from Boston. My wife’s 12 mini had already reconnected to the cell network 10 min ago, but I was still waiting, toggling, but nothing. Eventually I rebooted my iPhone and then it immediately reconnected to T-Mobile’s network. Odd bug.

    I don’t recall lately getting prompted to update the carrier profile. Maybe it’s unrelated. Wonder if it’s affecting people across many carriers.

Join the discussion in the TidBITS Discourse forum

Participants

Avatar for ace Avatar for jcenters Avatar for Simon Avatar for alvarnell Avatar for david_tuma Avatar for schwartz Avatar for ddmiller Avatar for henry.crun Avatar for mpainesyd Avatar for deemery Avatar for dzurn Avatar for Pgaskill Avatar for Shamino Avatar for tkerley Avatar for macanix