Microsoft has recently announced that Office 365 apps would no longer run on macOS 10.13 High Sierra as of November 10, as the company is switching the focus to newer operating systems.
- 365 Office Sierra 10.12.6 Software
- 365 Office Sierra 10.12.6 Key
- 365 Office Sierra 10.12.6 Full
- 365 Office Sierra 10.12.6 Version
- From your Mac, sign in to Office 365 operated by 21Vianet with your work or school account. Go to Settings Office 365 Settings Software. On the Software page, under Install Office 2016 for Mac, select Install to begin downloading the installer package. Once the download has completed, open Finder, go to Downloads, and double-click Microsoft.
- I recently purchased Microsoft 365 and just found out I need High Sierra or newer installed on my Mac Pro before it will work. I cannot locate High Sierra to download or upgrade.
- May 09, 2018 I want to install my office 365 on a laptop at work. Answered by a verified Microsoft Office Technician.
- Get Office apps for Mac. Start quickly with the most recent versions of Word, Excel, PowerPoint, Outlook, OneNote and OneDrive —combining the familiarity of Office and the unique Mac features you love.
Jul 19, 2017 Download macOS Sierra 10.12.6 Combo Update. This update is recommended for all macOS Sierra users. The macOS Sierra 10.12.6 Update improves the security, stability, and compatibility of your Mac, and is recommended for all users. Resolves an issue that prevents making certain SMB connections from the Finder.
Needless to say, the change doesn’t come as a big surprise, as dropping support for old OS versions is something that happens on all platforms.
Microsoft says that Microsoft 365 for Mac and Office 2019 for Mac would no longer receive updates on an Apple computer unless it runs macOS 10.14 Mojave or a newer version.
“As of the November 2020 (build 16.43) update for Microsoft 365 for Mac or Office 2019 for Mac, macOS 10.14 Mojave or later is required to receive updates to Word, Excel, PowerPoint, Outlook and OneNote. If you continue with an older version of macOS, your Office apps will still work, but you'll no longer receive any updates including security updates,” Microsoft explains.
“Upgrading your operating system to macOS 10.14 or later will allow Office updates to be delivered for your apps. Note that new installs of Microsoft 365 for Mac or Office 2019 for Mac will also require macOS 10.14 or later.”
Updating macOS, the best way to go
Needless to say, if you continue to run Microsoft Office app on macOS 10.13 or older, everything is supposed to work just like before, only that no other improvements are released. Not to mention that doing this comes with major security risks, as the vulnerabilities found in the productivity suite would no longer be fixed, leaving your device and data exposed to possible attacks.
“As new major versions of macOS are released and older versions become unsupported, we highly recommend you continue to update your macOS to a supported version in order to receive mainstream support such as security updates as well as new features (if you’re an Microsoft 365 for Mac subscriber). This applies for both Microsoft 365 for Mac and Office 2019 for Mac users,” the company explains.
Of course, the best way to go right now is to update to a newer version of macOS if your device supports it.
About Apple security updates
For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.
For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key.
Apple security documents reference vulnerabilities by CVE-ID when possible.
macOS Sierra 10.12.6, Security Update 2017-003 El Capitan, and Security Update 2017-003 Yosemite
Released July 19, 2017
afclip
Available for: macOS Sierra 10.12.5
Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution
Description: A memory corruption issue was addressed through improved input validation.
CVE-2017-7016: riusksk (泉哥) of Tencent Security Platform Department
afclip
Available for: macOS Sierra 10.12.5
Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7033: riusksk (泉哥) of Tencent Security Platform Department
AppleGraphicsControl
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-13853: shrek_wzw from Qihoo 360 NirvanTeam
Entry added November 2, 2017
AppleGraphicsPowerManagement
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7021: sss and Axis of Qihoo 360 Nirvan Team
Audio
Available for: macOS Sierra 10.12.5
Impact: Processing a maliciously crafted audio file may disclose restricted memory
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7015: riusksk (泉哥) of Tencent Security Platform Department
Bluetooth
Available for: macOS Sierra 10.12.5
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7050: Min (Spark) Zheng of Alibaba Inc.
CVE-2017-7051: Alex Plaskett of MWR InfoSecurity
Bluetooth
Available for: macOS Sierra 10.12.5
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7054: Alex Plaskett of MWR InfoSecurity, Lufeng Li of Qihoo 360 Vulcan Team
Contacts
Available for: macOS Sierra 10.12.5
Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution
Description: A buffer overflow issue was addressed through improved memory handling.
CVE-2017-7062: Shashank (@cyberboyIndia)
CoreAudio
Available for: macOS Sierra 10.12.5
Impact: Processing a maliciously crafted movie file may lead to arbitrary code execution
Description: A memory corruption issue was addressed with improved bounds checking.
CVE-2017-7008: Yangkang (@dnpushme) of Qihoo 360 Qex Team
curl
Available for: macOS Sierra 10.12.5
Impact: Multiple issues in curl
Description: Multiple issues were addressed by updating to version 7.54.0.
CVE-2016-9586
CVE-2016-9594
CVE-2017-2629
CVE-2017-7468
Foundation
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: Processing a maliciously crafted file may lead to arbitrary code execution
Description: A memory corruption issue was addressed through improved input validation.
CVE-2017-7031: HappilyCoded (ant4g0nist and r3dsm0k3)
Font Importer
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: Processing a maliciously crafted font may result in the disclosure of process memory
Description: A memory corruption issue was addressed through improved input validation.
CVE-2017-13850: John Villamil, Doyensec
Entry added October 31, 2017
Intel Graphics Driver
Available for: macOS Sierra 10.12.5
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7014: Lee of Minionz, Axis and sss of Qihoo 360 Nirvan Team
CVE-2017-7017: chenqin of Ant-financial Light-Year Security Lab (蚂蚁金服巴斯光年安全实验室)
CVE-2017-7035: shrek_wzw of Qihoo 360 Nirvan Team
CVE-2017-7044: shrek_wzw of Qihoo 360 Nirvan Team
Intel Graphics Driver
Available for: macOS Sierra 10.12.5
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input sanitization.
CVE-2017-7036: shrek_wzw of Qihoo 360 Nirvan Team
CVE-2017-7045: shrek_wzw of Qihoo 360 Nirvan Team
IOUSBFamily
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7009: shrek_wzw of Qihoo 360 Nirvan Team
Kernel
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7022: an anonymous researcher
CVE-2017-7024: an anonymous researcher
Kernel
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7023: an anonymous researcher
Kernel
Available for: macOS Sierra 10.12.5
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7025: an anonymous researcher
CVE-2017-7027: an anonymous researcher
CVE-2017-7069: Proteas of Qihoo 360 Nirvan Team
Kernel
Available for: macOS Sierra 10.12.5
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7026: an anonymous researcher
Kernel
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input sanitization.
CVE-2017-7028: an anonymous researcher
CVE-2017-7029: an anonymous researcher
Kernel
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input sanitization.
CVE-2017-7067: shrek_wzw of Qihoo 360 Nirvan Team
kext tools
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7032: Axis and sss of Qihoo 360 Nirvan Team
libarchive
Available for: macOS Sierra 10.12.5
Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution
Description: A buffer overflow was addressed through improved bounds checking.
CVE-2017-7068: found by OSS-Fuzz
libxml2
Available for: macOS Sierra 10.12.5, OS X El Capitan 10.11.6, and OS X Yosemite 10.10.5
Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information
365 Office Sierra 10.12.6 Software
Description: An out-of-bounds read was addressed through improved bounds checking.
CVE-2017-7010: Apple
CVE-2017-7013: found by OSS-Fuzz
libxpc
Available for: macOS Sierra 10.12.5 and OS X El Capitan 10.11.6
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7047: Ian Beer of Google Project Zero
Wi-Fi
Available for: macOS Sierra 10.12.5
Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7065: Gal Beniamini of Google Project Zero
Entry added September 25, 2017
Wi-Fi
365 Office Sierra 10.12.6 Key
Available for: macOS Sierra 10.12.5
Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip
Description: A memory corruption issue was addressed with improved memory handling.
365 Office Sierra 10.12.6 Full
CVE-2017-9417: Nitay Artenstein of Exodus Intelligence
365 Office Sierra 10.12.6 Version
macOS Sierra 10.12.6, Security Update 2017-003 El Capitan, and Security Update 2017-003 Yosemite includes the security content of Safari 10.1.2.
Additional recognition
curl
We would like to acknowledge Dave Murdock of Tangerine Element for their assistance.