Apple unveiled macOS Sequoia on Monday, but this update has disrupted the functionalities of certain networking and security applications from firms like Microsoft, CrowdStrike, and SentinelOne, as reported by Bleeping Computer. Users on Reddit are noting their challenges with security solutions like ESET Endpoint Security and CrowdStrike Falcon.
Other issues include firewalls causing packet corruptions, SSL failures in web browsers, and difficulties executing the “curl” or “get” commands. Users can temporarily resolve these concerns by disabling the security tools, suggesting an incompatibility with the new network stack—however, this isn’t a long-term solution many would prefer.
Bleeping Computer has revealed an internal warning where CrowdStrike advises users to refrain from upgrading to macOS 15, stating, “Due to changes to internal networking structures on macOS 15 Sequoia, customers should hold off on upgrading until a Mac sensor is available that fully supports macOS 15 Sequoia.” SentinelOne support echoed similar advice to their users.
ESET has alerted affected users with guidance for resolving their issues. The company recommends navigating to System Settings > Network > Filters > Remove ESET Network. They clarified that this solution is applicable only for Endpoint Security version 8.1.6.0 or newer, and ESET Cyber Security version 7.5.74.0 or newer, as older versions do not support this fix.
VPN services are also experiencing difficulties, with users reporting problems with Mullvad VPN and corporate solutions. However, Proton VPN continues to function smoothly on the latest macOS 15 release. Apple has not yet provided official commentary on the problems, but a note from the macOS 15 release hints that an outdated component in the Firewall may be the culprit.
This situation isn’t unprecedented; earlier releases of Apple’s operating systems have led to similar issues. When macOS Ventura launched, it prompted a series of disruptions that echoed sentiments shared by longtime iOS and Mac security expert Patrick Wardle on his LinkedIn page.
Wardle noted, “Déjà vu?! Did Apple *again* release a new OS that *again* impacts third-party security tools?” He commented on a bug from two years ago involving macOS Ventura that caused comparable problems, suggesting the core issue may lie within the macOS firewall or its lower-level networking extension subsystem that leads to packet corruption and other accidental alterations in network structures.
If you rely on these tools, it may be wise to delay your upgrade. It’s hoped that Apple will release a patch soon, allowing Mac users to enjoy the latest features without compatibility concerns.