Description:
Apple has released iOS 18.5, iPadOS 18.5, macOS Sequoia 15.5, macOS Sonoma 14.7.6, macOS Ventura 13.7.6 and Safari 18.5 to fix the multiple vulnerabilities in various Apple devices. The list of vulnerabilities information can be found at:
https://support.apple.com/en-us/122404
https://support.apple.com/en-us/122405
https://support.apple.com/en-us/122716
https://support.apple.com/en-us/122717
https://support.apple.com/en-us/122718
https://support.apple.com/en-us/122719
Affected Systems:
- iPhone XS and later
- iPad 7th generation and later, Air 3rd generation and later, mini 5th generation and later, Pro 10.5-inch, Pro 11-inch 1st generation and later, Pro 12.9-inch 2rd generation later, Pro 13-inch and later
- macOS Sequoia prior to version 15.5
- macOS Sonoma prior to version 14.7.6
- macOS Ventura prior to version 13.7.6
- Safari prior to version 18.5
Impact:
Depending on the vulnerabilities being exploited, a successful exploitation could lead to remote code execution, denial of service, elevation of privilege, information disclosure, security restriction bypass or spoofing on an affected device.
Recommendation:
Patches for affected products are available. Users of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
The updates can be obtained through the auto-update mechanism. Users of affected systems should follow the recommendations provided by the vendor and take immediate actions to mitigate the risk.
More Information:
- https://support.apple.com/en-us/122404
- https://support.apple.com/en-us/122405
- https://support.apple.com/en-us/122716
- https://support.apple.com/en-us/122717
- https://support.apple.com/en-us/122718
- https://support.apple.com/en-us/122719
- https://www.hkcert.org/security-bulletin/apple-products-multiple-vulnerabilities_20250513
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24155
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24222 (to CVE-2025-24223)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24225
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24258 (to CVE-2025-24259)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24274
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465 (to CVE-2025-26466)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30440
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30442 (to CVE-2025-30443)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30448
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30453
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31196
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204 (to CVE-2025-31210)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31212 (to CVE-2025-31215)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31217 (to CVE-2025-31228)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31232 (to CVE-2025-31242)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31244 (to CVE-2025-31247)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31249 (to CVE-2025-31251)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31253
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31256 (to CVE-2025-31260)