Updating Applications from Apple's App Store

How to manually update apps on your Apple device

You can turn off automatic updates and update apps manually. Or you can turn on automatic updates so that you don't need to manually update each app.

Update your apps manually

On your iPhone and iPad, apps that you download from the App Store are automatically updated by default. But if there's an issue, you can update an app manually.

How to manually update apps on your iPhone or iPad

  1. Open the App Store.

  2. Tap your profile icon at the top of the screen.

  3. Scroll to see pending updates and release notes. Tap Update next to an app to update only that app, or tap Update All.

Learn what to do if you can't update an app on your iPhone or iPad.

How to manually update apps on your Mac

  1. Open the App Store.

  2. In the sidebar, click Updates.

  3. Click Update next to an app to update only that app, or click Update All.


If you didn’t get the app from the App Store on your Mac, contact the app developer to get help with updates.

Learn what to do if you can't update an app on your Mac.

How to manually update apps on your Apple Watch

  1. Open the App Store and scroll down to the bottom.

  2. Tap Account.

  3. Tap Updates.

  4. Tap Update next to an app to update only that app, or tap Update All.

Turn on or turn off automatic updates

If you prefer to manually update all your apps, turn off automatic updates. When you do this, you receive notifications from the App Store each time an update for one of your apps is released. 

How to turn on or turn off automatic updates on your iPhone or iPad

  1. Go to Settings.

  2. Tap App Store.

  3. Turn on or turn off App Updates.



How to turn on or turn off automatic updates on your Mac

  1. Open the App Store.

  2. From the menu bar at the top of the screen, choose App Store > Preferences.

  3. Select or deselect Automatic Updates.

How to turn on or turn off automatic updates on your Apple Watch

  1. Go to Settings > App Store.

  2. Turn on or turn off Automatic Updates.

You can also open the Watch app on your iPhone, scroll to App Store and tap it, then turn on or turn off Automatic Updates.

How to turn on or turn off automatic updates on your Apple TV HD or 4K

  1. Go to Settings > Apps.

  2. Select or deselect Automatically Update Apps.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: November 08, 2021

2022.0818 Apple Security Concern

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

Safari 15.6.1

Released August 18, 2022

WebKit

Available for: macOS Big Sur and macOS Catalina

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

WebKit Bugzilla: 243557
CVE-2022-32893: an anonymous researcher


About the security content of iOS 15.6.1 and iPadOS 15.6.1

This document describes the security content of iOS 15.6.1 and iPadOS 15.6.1.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.


iOS 15.6.1 and iPadOS 15.6.1

Released August 17, 2022

Kernel

Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

CVE-2022-32894: an anonymous researcher

WebKit

Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

WebKit Bugzilla: 243557
CVE-2022-32893: an anonymous researcher


About the security content of macOS Monterey 12.5.1

This document describes the security content of macOS Monterey 12.5.1.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.


macOS Monterey 12.5.1

Released August 17, 2022

Kernel

Available for: macOS Monterey

Impact: An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

CVE-2022-32894: an anonymous researcher

WebKit

Available for: macOS Monterey

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved bounds checking.

WebKit Bugzilla: 243557
CVE-2022-32893: an anonymous researcher


New macOS 12.5.1 and iOS 15.6.1 updates patch “actively exploited” vulnerabilities

The two vulnerabilities are the same for all three operating systems, with the first tracked as CVE-2022-32894. This vulnerability is an out-of-bounds write vulnerability in the operating system's Kernel.

The kernel is a program that operates as the core component of an operating system and has the highest privileges in macOS, iPadOS, and iOS.

An application, such as malware, can use this vulnerability to execute code with Kernel privileges. As this is the highest privilege level, a process would be able to perform any command on the device, effectively taking complete control over it.

The second zero-day vulnerability is CVE-2022-32893 and is an out-of-bounds write vulnerability in WebKit, the web browser engine used by Safari and other apps that can access the web.

Apple says this flaw would allow an attacker to perform arbitrary code execution and, as it's in the web engine, could likely be exploited remotely by visiting a maliciously crafted website.

The bugs were reported by anonymous researchers and fixed by Apple in iOS 15.6.1,  iPadOS 15.6.1, and macOS Monterey 12.5.1 with improved bounds checking for both bugs.

The list of devices affected by both vulnerabilities are:

  • Macs running macOS Monterey

  • iPhone 6s and later

  • iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation).


Update, Aug. 18, 3:45 p.m.: Apple has released the Safari 15.6.1 update for macOS Big Sur and Catalina to patch the WebKit vulnerability it fixed in macOS Monterey yesterday. Still no word on whether the kernel vulnerability is present in either of these older operating systems, but we'll update if Apple responds to our query.

Original story: Apple has released a trio of operating system updates to patch security vulnerabilities that it says "may have been actively exploited." The macOS 12.5.1, iOS 15.6.1, and iPadOS 15.6.1 updates are available for download now and should be installed as soon as possible.

The three updates all fix the same pair of bugs. One, labeled CVE-2022-32894, is a kernel vulnerability that can allow apps "to execute arbitrary code with kernel privileges. The other, CVE-2022-32893, is a WebKit bug that allows for arbitrary code execution via "maliciously crafted web content." Both discoveries are attributed to an anonymous security researcher. WebKit is used in the Safari browser as well as in apps like Mail that use Apple's WebViews to render and display content.

Apple didn't release equivalent security patches for macOS Catalina or Big Sur, two older versions of macOS that are still receiving regular security updates. We've contacted Apple to see whether it plans to release these patches for these older OSes, or if they aren't affected by the bugs and don't need to be patched.

Apple's software release notes for the updates don't reference any other fixes or features. Apple is actively developing iOS 16, iPadOS 16, and macOS Ventura, and those updates are due out later this fall.

AirPods Pro Service Program for Sound Issues

Apple has determined that a small percentage of AirPods Pro may experience sound issues. Affected units were manufactured before October 2020.

An affected AirPods Pro may exhibit one or more of the following behaviors:

  • Crackling or static sounds that increase in loud environments, with exercise or while talking on the phone

  • Active Noise Cancellation not working as expected, such as a loss of bass sound, or an increase in background sounds, such as street or airplane noise

Apple or an Apple Authorized Service Provider will service the affected AirPods Pro (left, right or both), free of charge.

Note: No other AirPods models are part of this program

Service Process

Choose one of the service options below to have your AirPods Pro serviced. Your AirPods Pro will be examined prior to any service to verify that they are eligible for this program. AirPods Pro (left, right or both) with a confirmed issue will be replaced. The AirPods Pro case is not affected and will not be replaced.

Additional Information

This worldwide Apple program doesn't extend the standard warranty coverage of the AirPods Pro.

The program covers affected AirPods Pro for 3 years after the first retail sale of the unit.