macOS Sequoia breaks security tools from CrowdStrike, Microsoft, and others

macOS Sequoia breaks security tools from CrowdStrike, Microsoft, and others

Users are reporting issues with endpoint malware analysis tools on MacOS Sequoia. There have also been complaints about VPN connections. The developers recommend not updating macOS just yet.

On Reddit, users report problems with CrowdStrike Falcon and ESET Endpoint Security. Unable to use wget and curl due to errors. SSL failures in web browsers and the inability to connect to the network are also common. In addition, some VPN clients have stopped working for users, so the update may make it difficult to access corporate resources via VPN.

Bugs were spotted in tools from CrowdStrike, Microsoft, SentinelOne, Google and other corporations. So far, companies are recommending against updating macOS, citing the changed network stack of the operating system as the reason. Changes to the macOS firewall are likely causing the crash.

Developer Wacław Jacek offered a temporary solution to the problem. He published the instructions on his blog, but noted that the described steps should be followed for every application that refuses to work with the network after the macOS update.

Also, after the release of macOS Sequoia, developers noticed that the system sends some challenges past the encrypted DNS proxy. This bug appeared in one of the minor versions of Sonoma, but Apple still hasn’t fixed it.

Related posts