Last Catalina Update



Catalina's top-rated Zip Line Eco Tour takes you 600 feet above Descanso Beach Club, where you’ll enjoy sweeping ocean views as you zip across the canyon and through the trees on five separate lines at speeds approaching 35 mph. During this 2-hour adventure, trained guides will share interesting facts about the unique flora and fauna found. Catalina is the first version of macOS to support only 64-bit applications and the first to include Activation Lock. It is also the last version of macOS to have the version number prefix of 10. Its successor, Big Sur, is version 11. MacOS Big Sur succeeded macOS Catalina on November 12, 2020. Catalina is an early launch partner of Switchboard, a module within The Tapad Graph that will connect emerging cookieless identifiers to traditional IDs, creating a more holistic view of the consumer and driving value exchange within the advertising ecosystem.

  1. What Is The Latest Catalina Update
  2. What Is The Most Recent Version Of Catalina
  3. Last Catalina Updates
  4. Last Catalina Update Youtube
  5. Last Catalina Update

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave

Last catalina update

Released February 1, 2021

Analytics

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: A remote attacker may be able to cause a denial of service

Description: This issue was addressed with improved checks.

CVE-2021-1761: Cees Elzinga

APFS

Available for: macOS Big Sur 11.0.1

Impact: A local user may be able to read arbitrary files

Description: The issue was addressed with improved permissions logic.

CVE-2021-1797: Thomas Tempelmann

CFNetwork Cache

Available for: macOS Catalina 10.15.7 and macOS Mojave 10.14.6

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: An integer overflow was addressed with improved input validation.

CVE-2020-27945: Zhuo Liang of Qihoo 360 Vulcan Team

CoreAnimation

Available for: macOS Big Sur 11.0.1

Impact: A malicious application could execute arbitrary code leading to compromise of user information

Description: A memory corruption issue was addressed with improved state management.

CVE-2021-1760: @S0rryMybad of 360 Vulcan Team

CoreAudio

Available for: macOS Big Sur 11.0.1

Impact: Processing maliciously crafted web content may lead to code execution

Description: An out-of-bounds write was addressed with improved input validation.

CVE-2021-1747: JunDong Xie of Ant Security Light-Year Lab

CoreGraphics

Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted font file may lead to arbitrary code execution

Description: An out-of-bounds write issue was addressed with improved bounds checking.

CVE-2021-1776: Ivan Fratric of Google Project Zero

Entry updated March 16, 2021

CoreMedia

Available for: macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted image may lead to arbitrary code execution

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2021-1759: Hou JingYi (@hjy79425575) of Qihoo 360 CERT

CoreText

Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted text file may lead to arbitrary code execution

Description: A stack overflow was addressed with improved input validation.

CVE-2021-1772: Mickey Jin (@patch1t) of Trend Micro working with Trend Micro’s Zero Day Initiative

Entry updated March 16, 2021

CoreText

Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1

Impact: A remote attacker may be able to cause arbitrary code execution

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2021-1792: Mickey Jin & Junzhi Lu of Trend Micro working with Trend Micro’s Zero Day Initiative

Entry updated March 16, 2021

Crash Reporter

Available for: macOS Catalina 10.15.7

Impact: A remote attacker may be able to cause a denial of service

Description: This issue was addressed with improved checks.

CVE-2021-1761: Cees Elzinga

Crash Reporter

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: A local attacker may be able to elevate their privileges

Description: Multiple issues were addressed with improved logic.

CVE-2021-1787: James Hutchins

Crash Reporter

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: A local user may be able to create or modify system files

Description: A logic issue was addressed with improved state management.

CVE-2021-1786: Csaba Fitzl (@theevilbit) of Offensive Security

Directory Utility

Available for: macOS Catalina 10.15.7

Impact: A malicious application may be able to access private information

Description: A logic issue was addressed with improved state management.

CVE-2020-27937: Wojciech Reguła (@_r3ggi) of SecuRing

Endpoint Security

Available for: macOS Catalina 10.15.7

Impact: A local attacker may be able to elevate their privileges

Description: A logic issue was addressed with improved state management.

CVE-2021-1802: Zhongcheng Li (@CK01) of WPS Security Response Center

FairPlay

Available for: macOS Big Sur 11.0.1

Impact: A malicious application may be able to disclose kernel memory

Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation.

CVE-2021-1791: Junzhi Lu (@pwn0rz), Qi Sun & Mickey Jin of Trend Micro working with Trend Micro’s Zero Day Initiative

FontParser

Available for: macOS Catalina 10.15.7

Impact: Processing a maliciously crafted font may lead to arbitrary code execution

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2021-1790: Peter Nguyen Vu Hoang of STAR Labs

FontParser

Available for: macOS Mojave 10.14.6

Impact: Processing a maliciously crafted font may lead to arbitrary code execution

Description: This issue was addressed by removing the vulnerable code.

CVE-2021-1775: Mickey Jin and Qi Sun of Trend Micro working with Trend Micro’s Zero Day Initiative

Entry updated March 16, 2021

FontParser

Available for: macOS Mojave 10.14.6

Impact: A remote attacker may be able to leak memory

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2020-29608: Xingwei Lin of Ant Security Light-Year Lab

FontParser

Available for: macOS Big Sur 11.0.1 and macOS Catalina 10.15.7

Impact: A remote attacker may be able to cause arbitrary code execution

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2021-1758: Peter Nguyen of STAR Labs

ImageIO

Available for: macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted image may lead to arbitrary code execution

Description: An access issue was addressed with improved memory management.

CVE-2021-1783: Xingwei Lin of Ant Security Light-Year Lab

ImageIO

Available for: macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted image may lead to arbitrary code execution

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2021-1741: Xingwei Lin of Ant Security Light-Year Lab

CVE-2021-1743: Mickey Jin & Junzhi Lu of Trend Micro working with Trend Micro’s Zero Day Initiative, Xingwei Lin of Ant Security Light-Year Lab


ImageIO

Available for: macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted image may lead to a denial of service

Last Catalina Update

Description: A logic issue was addressed with improved state management.

CVE-2021-1773: Xingwei Lin of Ant Security Light-Year Lab

ImageIO

Available for: macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted image may lead to a denial of service

Description: An out-of-bounds read issue existed in the curl. This issue was addressed with improved bounds checking.

CVE-2021-1778: Xingwei Lin of Ant Security Light-Year Lab

ImageIO

Available for: macOS Catalina 10.15.7, macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted image may lead to arbitrary code execution

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2021-1736: Xingwei Lin of Ant Security Light-Year Lab

CVE-2021-1785: Xingwei Lin of Ant Security Light-Year Lab

Entry updated March 16, 2021

ImageIO

Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted image may lead to a denial of service

Description: This issue was addressed with improved checks.

CVE-2021-1766: Danny Rosseau of Carve Systems

Entry updated March 16, 2021

ImageIO

Available for: macOS Catalina 10.15.7, macOS Big Sur 11.0.1

What Is The Latest Catalina Update

Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution

Description: A logic issue was addressed with improved state management.

CVE-2021-1818: Xingwei Lin of Ant-Financial Light-Year Security Lab

Entry updated March 16, 2021

ImageIO

Available for: macOS Catalina 10.15.7, macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted image may lead to arbitrary code execution

Description: This issue was addressed with improved checks.

CVE-2021-1742: Xingwei Lin of Ant Security Light-Year Lab

CVE-2021-1746: Jeonghoon Shin(@singi21a) of THEORI, Mickey Jin & Qi Sun of Trend Micro working with Trend Micro’s Zero Day Initiative, Xingwei Lin of Ant Security Light-Year Lab

CVE-2021-1754: Xingwei Lin of Ant Security Light-Year Lab

CVE-2021-1774: Xingwei Lin of Ant Security Light-Year Lab

CVE-2021-1777: Xingwei Lin of Ant Security Light-Year Lab

Roblox not downloading mac

CVE-2021-1793: Xingwei Lin of Ant Security Light-Year Lab

Entry updated March 16, 2021

ImageIO

Available for: macOS Big Sur 11.0.1 and macOS Catalina 10.15.7

Impact: Processing a maliciously crafted image may lead to arbitrary code execution

Description: An out-of-bounds write was addressed with improved input validation.

CVE-2021-1737: Xingwei Lin of Ant Security Light-Year Lab

CVE-2021-1738: Lei Sun

CVE-2021-1744: Xingwei Lin of Ant Security Light-Year Lab

IOKit

Available for: macOS Big Sur 11.0.1

Impact: An application may be able to execute arbitrary code with system privileges

Description: A logic error in kext loading was addressed with improved state handling.

CVE-2021-1779: Csaba Fitzl (@theevilbit) of Offensive Security

IOSkywalkFamily

Available for: macOS Big Sur 11.0.1

Impact: A local attacker may be able to elevate their privileges

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2021-1757: Pan ZhenPeng (@Peterpan0927) of Alibaba Security, Proteas

Kernel

Available for: macOS Catalina 10.15.7 and macOS Mojave 10.14.6

Impact: An application may be able to execute arbitrary code with kernel privileges

Description: A logic issue existed resulting in memory corruption. This was addressed with improved state management.

CVE-2020-27904: Zuozhi Fan (@pattern_F_) of Ant Group Tianqiong Security Lab

Kernel

Available for: macOS Big Sur 11.0.1

Impact: A remote attacker may be able to cause a denial of service

Description: A use after free issue was addressed with improved memory management.

CVE-2021-1764: @m00nbsd

Kernel

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited.

Description: A race condition was addressed with improved locking.

CVE-2021-1782: an anonymous researcher

Kernel

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: An application may be able to execute arbitrary code with kernel privileges

Description: Multiple issues were addressed with improved logic.

CVE-2021-1750: @0xalsr

Login Window

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: An attacker in a privileged network position may be able to bypass authentication policy

Description: An authentication issue was addressed with improved state management.

CVE-2020-29633: Jewel Lambert of Original Spin, LLC.

Messages

Available for: macOS Big Sur 11.0.1

Impact: A malicious application may be able to leak sensitive user information

Description: A privacy issue existed in the handling of Contact cards. This was addressed with improved state management.

CVE-2021-1781: Csaba Fitzl (@theevilbit) of Offensive Security

Entry added March 16, 2021

Messages

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: A user that is removed from an iMessage group could rejoin the group

Description: This issue was addressed with improved checks.

CVE-2021-1771: Shreyas Ranganatha (@strawsnoceans)

Model I/O

Available for: macOS Big Sur 11.0.1

Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution

Description: An out-of-bounds write was addressed with improved input validation.

CVE-2021-1762: Mickey Jin of Trend Micro working with Trend Micro’s Zero Day Initiative

Entry updated March 16, 2021

Model I/O

Available for: macOS Catalina 10.15.7 Is macbook pro late 2013 still supported.

Impact: Processing a maliciously crafted file may lead to heap corruption

Description: This issue was addressed with improved checks.

CVE-2020-29614: ZhiWei Sun (@5n1p3r0010) of Topsec Alpha Lab

Model I/O

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution

Description: A buffer overflow was addressed with improved bounds checking.

CVE-2021-1763: Mickey Jin of Trend Micro working with Trend Micro’s Zero Day Initiative

Model I/O

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: Processing a maliciously crafted image may lead to heap corruption

Description: This issue was addressed with improved checks.

CVE-2021-1767: Mickey Jin & Junzhi Lu of Trend Micro working with Trend Micro’s Zero Day Initiative

Model I/O

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution

Description: An out-of-bounds read was addressed with improved input validation.

CVE-2021-1745: Mickey Jin & Junzhi Lu of Trend Micro working with Trend Micro’s Zero Day Initiative

Model I/O

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: Processing a maliciously crafted image may lead to arbitrary code execution

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2021-1753: Mickey Jin of Trend Micro working with Trend Micro’s Zero Day Initiative

Model I/O

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution

Description: An out-of-bounds read was addressed with improved bounds checking.

CVE-2021-1768: Mickey Jin & Junzhi Lu of Trend Micro working with Trend Micro’s Zero Day Initiative

NetFSFramework

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: Mounting a maliciously crafted Samba network share may lead to arbitrary code execution

What Is The Most Recent Version Of Catalina

Description: A logic issue was addressed with improved state management.

CVE-2021-1751: Mikko Kenttälä (@Turmio_) of SensorFu

OpenLDAP

Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6

Impact: A remote attacker may be able to cause a denial of service

Description: This issue was addressed with improved checks.

CVE-2020-25709

Power Management

Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7

Impact: A malicious application may be able to elevate privileges

Description: A logic issue was addressed with improved state management.

CVE-2020-27938: Tim Michaud (@TimGMichaud) of Leviathan

Screen Sharing

Available for: macOS Big Sur 11.0.1

Impact: Multiple issues in pcre

Description: Multiple issues were addressed by updating to version 8.44.

CVE-2019-20838

CVE-2020-14155

SQLite

Available for: macOS Catalina 10.15.7

Impact: Multiple issues in SQLite

Description: Multiple issues were addressed with improved checks.

CVE-2020-15358

Swift

Available for: macOS Big Sur 11.0.1

The installation of Java (also known as the Java Runtime Environment or JRE) is a simple process on Windows, Mac, Linux or Solaris. Use these instructions to install Java software on your desktop. Macos install java It is possible to use apt-get on OS X 10.9 like Deb based Linux using a third party software named Fink - How to Install apt-get on Mac OS X. However, unlike Homebrew and OS X Package Managers, Fink does not use /usr/local/ path to install software. Elasticsearch is as a.tar.gz archive for Linux and MacOS. This package contains both free and subscription features. Start a 30-day trial to try out all of the features. The latest stable version of Elasticsearch can be found on the Download Elasticsearch page. Other versions can be found on the. How To Set Java Path & JAVAHOME in Windows 10, MacOS & Ubuntu By Dmytro Shvechikov Java Tutorials 0 Comments I’ll explain to you how to set Java path variable on Windows, macOS, and Ubuntu (Linux).

Impact: A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication

Description: A logic issue was addressed with improved validation.

CVE-2021-1769: CodeColorist of Ant-Financial Light-Year Labs

WebKit

Available for: macOS Big Sur 11.0.1

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A use after free issue was addressed with improved memory management.

CVE-2021-1788: Francisco Alonso (@revskills)

Last Catalina Updates

WebKit

Available for: macOS Big Sur 11.0.1

Impact: Maliciously crafted web content may violate iframe sandboxing policy

Description: This issue was addressed with improved iframe sandbox enforcement.

CVE-2021-1765: Eliya Stein of Confiant

CVE-2021-1801: Eliya Stein of Confiant

WebKit

Available for: macOS Big Sur 11.0.1

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A type confusion issue was addressed with improved state handling.

CVE-2021-1789: @S0rryMybad of 360 Vulcan Team

WebKit

Available for: macOS Big Sur 11.0.1

Impact: A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Description: A logic issue was addressed with improved restrictions.

CVE-2021-1871: an anonymous researcher

CVE-2021-1870: an anonymous researcher

WebRTC

Available for: macOS Big Sur 11.0.1

Impact: A malicious website may be able to access restricted ports on arbitrary servers

Description: A port redirection issue was addressed with additional port validation.

CVE-2021-1799: Gregory Vishnepolsky & Ben Seri of Armis Security, and Samy Kamkar

Additional recognition

Kernel

We would like to acknowledge Junzhi Lu (@pwn0rz), Mickey Jin & Jesse Change of Trend Micro for their assistance.

libpthread

We would like to acknowledge CodeColorist of Ant-Financial Light-Year Labs for their assistance.

Login Window

We would like to acknowledge Jose Moises Romero-Villanueva of CrySolve for their assistance.

Mail Drafts

We would like to acknowledge Jon Bottarini of HackerOne for their assistance.

Screen Sharing Server

We would like to acknowledge @gorelics for their assistance.

WebRTC

We would like to acknowledge Philipp Hancke for their assistance.

macOS Big Sur elevates the most advanced desktop operating system in the world to a new level of power and beauty. Experience Mac to the fullest with a refined new design. Enjoy the biggest Safari update ever. Discover new features for Maps and Messages. Get even more transparency around your privacy.

Chances are your Mac can run macOS Big Sur

The following models are supported:

  • MacBook (2015 or later)
  • MacBook Air (2013 or later)
  • MacBook Pro (Late 2013 or later)
  • Mac mini (2014 or later)
  • iMac (2014 or later)
  • iMac Pro (2017 or later)
  • Mac Pro (2013 or later)

To see which model you have, click the Apple icon in your menu bar and choose About This Mac.

Make sure you’re ready to upgrade.

Before you upgrade, we recommend that you back up your Mac. If your Mac is running OS X Mavericks 10.9 or later, you can upgrade directly to macOS Big Sur. You’ll need the following:

  • OS X 10.9 or later
  • 4GB of memory
  • 35.5GB of available storage on macOS Sierra or later*
  • Some features require an Apple ID; terms apply.
  • Some features require a compatible internet service provider; fees may apply.

Upgrading is free and easy

Upgrading from macOS Catalina 10.15 or Mojave 10.14?

Go to Software Update in System Preferences to find macOS Big Sur. Click Upgrade Now and follow the onscreen instructions.

Upgrading from an older version of macOS?

If you’re running any release from macOS 10.13 to 10.9, you can upgrade to macOS Big Sur from the App Store. If you’re running Mountain Lion 10.8, you will need to upgrade to El Capitan 10.11 first.

If you don’t have broadband access, you can upgrade your Mac at any Apple Store.

  • OS X 10.9 or later
  • 4GB of memory
  • 35.5GB of available storage on macOS Sierra or later*
  • Some features require an Apple ID; terms apply.
  • Some features require a compatible internet service provider; fees may apply.

For details about your Mac model, click the Apple icon at the top left of your screen and choose About This Mac. These Mac models are compatible with macOS Big Sur:

  • MacBook (2015 or later)
  • MacBook Air (2013 or later)
  • MacBook Pro (Late 2013 or later)
  • Mac mini (2014 or later)
  • iMac (2014 or later)
  • iMac Pro (2017 or later)
  • Mac Pro (2013 or later)

Siri

Requires a broadband internet connection and microphone (built-in or external).

Hey Siri

Supported by the following Mac models:

  • MacBook Pro (2018 or later)
  • MacBook Air (2018 or later)
  • iMac Pro (2017 or later)

Dictation, Voice Control and Voice Memos

Requires a microphone (built-in or external).

Spotlight Suggestions

Requires a broadband internet connection.

Gestures

Requires a Multi-Touch trackpad, Force Touch trackpad, Magic Trackpad or Magic Mouse.

Force Touch gestures require a Force Touch trackpad.

VoiceOver gestures require a Multi-Touch trackpad, Force Touch trackpad or Magic Trackpad.

Photo Booth

Requires a FaceTime or iSight camera (built-in or external) or USB video class (UVC) camera.

FaceTime

Audio calls require a microphone (built-in or external) and broadband internet connection.

Video calls require a built-in FaceTime camera, an iSight camera (built-in or external) or a USB video class (UVC) camera; and broadband internet connection.

Apple TV

High dynamic range (HDR) video playback is supported by the following Mac models:

  • MacBook Pro (2018 or later)
  • iMac Pro (2017 or later)
  • Mac Pro (2019) with Pro Display XDR

Dolby Atmos soundtrack playback is supported by the following Mac models:

  • MacBook Air (2018 or later)
  • MacBook Pro (2018 or later)

Sidecar

Supported by the following Mac models:

  • MacBook (2016 or later)
  • MacBook Air (2018 or later)
  • MacBook Pro (2016 or later)
  • Mac mini (2018 or later)
  • iMac (late 2015 or later)
  • iMac Pro (2017 or later)
  • Mac Pro (2019)

Supported by all iPad models with Apple Pencil support:

  • 12.9-inch iPad Pro
  • 11-inch iPad Pro
  • 10.5-inch iPad Pro
  • 9.7-inch iPad Pro
  • iPad (6th generation or later)
  • iPad mini (5th generation)
  • iPad Air (3rd and 4th generation)

Continuity Camera

Requires an iPhone or iPad that supports iOS 12 or later.

Continuity Sketch and Continuity Markup

Requires an iPhone with iOS 13 or later or an iPad with iPadOS 13 or later.

Handoff

Requires an iPhone or iPad with a Lightning connector or with USB‑C and iOS 8 or later.

Instant Hotspot

Requires an iPhone or iPad with cellular connectivity, a Lightning connector or USB‑C and iOS 8.1 or later. Requires Personal Hotspot service through your network provider.

Universal Clipboard

Requires an iPhone or iPad with a Lightning connector or with USB‑C and iOS 10 or later.

Auto Unlock

Requires an Apple Watch with watchOS 3 or later or an iPhone 5 or later.

Approve with Apple Watch

Requires an Apple Watch with watchOS 6 or later or an iPhone 6s or later with iOS 13 or later.

Apple Pay on the Web

Requires a MacBook Pro or MacBook Air with Touch ID, an iPhone 6 or later with iOS 10 or later, or an Apple Watch with watchOS 3 or later.

Phone Calling

Requires an iPhone with iOS 8 or later and an activated data plan.

SMS

Requires an iPhone with iOS 8.1 or later and an activated data plan.

Home

Requires an iPhone with iOS 12 or later and a configured Home app.

AirDrop

AirDrop to iOS and iPadOS devices requires an iPhone or iPad with a Lightning connector or with USB‑C and iOS 7 or later.

AirPlay

AirPlay Mirroring requires an Apple TV (2nd generation or later).

AirPlay for web video requires an Apple TV (2nd generation or later).

Peer-to-peer AirPlay requires a Mac (2012 or later) and an Apple TV (3rd generation rev A, model A1469 or later) with Apple TV software 7.0 or later.

Time Machine

Requires an external storage device (sold separately).

Last Catalina Update Youtube

Maps electric vehicle routing

Requires an iPhone with iOS 14 and a compatible electric vehicle.

Maps number plate restrictions

Requires an iPhone running iOS 14 or an iPad running iPadOS 14.

Boot Camp

Allows Boot Camp installations of Windows 10 on supported Mac models.

Exchange Support

Requires Microsoft Office 365, Exchange 2016, Exchange 2013 or Exchange Server 2010. Installing the latest Service Packs is recommended.

Windows Migration

Supports OS X 10.7 or later and Windows 7 or later.

App Store

Available only to persons aged 13 or older in the US and many other countries and regions.

Photos

The improved Retouch tool is supported on the following Mac models:

  • MacBook Pro (15-inch and 16-inch models) introduced in 2016 or later
  • iMac (Retina 5K models) introduced in 2014 or later
  • iMac (Retina 4K models) introduced in 2017 or later
  • iMac Pro (2017 or later)
  • Mac Pro introduced in 2013 or later
  • Apple Books
  • Apple News
  • App Store
  • Automator
  • Calculator
  • Calendar
  • Chess
  • Contacts
  • Dictionary
  • DVD Player
  • FaceTime
  • Find My
  • Font Book
  • Home
  • Image Capture
  • Launchpad
  • Mail
  • Maps
  • Messages
  • Mission Control
  • Music
  • Notes
  • Photo Booth
  • Photos
  • Podcasts
  • Preview
  • QuickTime Player
  • Reminders
  • Safari
  • Siri
  • Stickies
  • Stocks
  • System Preferences
  • TextEdit
  • Time Machine
  • TV
  • Voice Memos
  • Activity Monitor
  • AirPort Utility
  • Audio MIDI Setup
  • Bluetooth File Exchange
  • Boot Camp Assistant
  • ColorSync Utility
  • Console
  • Digital Colour Meter
  • Disk Utility

Last Catalina Update

  • Grapher
  • Keychain Access
  • Migration Assistant
  • Screenshot
  • Screen Time
  • Script Editor
  • Sidecar
  • System Information
  • Terminal
  • VoiceOver Utility
  • Arabic
  • Catalan
  • Croatian
  • Simplified Chinese
  • Traditional Chinese
  • Traditional Chinese (Hong Kong)
  • Czech
  • Danish
  • Dutch
  • English (Australia)
  • English (UK)
  • English (US)
  • Finnish
  • French
  • French (Canada)
  • German
  • Greek
  • Hebrew
  • Hindi
  • Hungarian
  • Indonesian
  • Italian
  • Japanese
  • Korean
  • Malay
  • Norwegian
  • Polish
  • Brazilian Portuguese
  • Portuguese
  • Romanian
  • Russian
  • Slovak
  • Spanish
  • Spanish (Latin America)
  • Swedish
  • Thai
  • Turkish
  • Ukrainian
  • Vietnamese