描述:
Apple 发布了 iOS 18.5、iPadOS 18.5、macOS Sequoia 15.5、macOS Sonoma 14.7.6、macOS Ventura 13.7.6 及 Safari 18.5,以应对不同 Apple 装置的多个漏洞。有关漏洞资料的列表,请参考以下网址:
https://support.apple.com/en-us/122404
https://support.apple.com/en-us/122405
https://support.apple.com/en-us/122716
https://support.apple.com/en-us/122717
https://support.apple.com/en-us/122718
https://support.apple.com/en-us/122719
受影响的系统:
- iPhone XS 及之后的型号
- iPad 第 7 代及之后的型号、Air 第 3 代及之后的型号、mini 第 5 代及之后的型号、Pro 10.5 吋、Pro 11 吋第 1 代及之后的型号、Pro 12.9 吋第 2 代及之后的型号、Pro 13 吋及之后的型号
- macOS Sequoia 15.5 之前的版本
- macOS Sonoma 14.7.6 之前的版本
- macOS Ventura 13.7.6 之前的版本
- Safari 18.5 之前的版本
影响:
成功利用漏洞可以导致受影响的装置发生远端执行程式码、服务被拒绝、权限提升、泄漏资讯、绕过保安限制或仿冒诈骗,视乎攻击者利用哪些漏洞而定。
建议:
现已有适用于受影响产品的修补程式。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
用户可透过产品本身的自动更新来获得更新。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://support.apple.com/en-us/122404
- https://support.apple.com/en-us/122405
- https://support.apple.com/en-us/122716
- https://support.apple.com/en-us/122717
- https://support.apple.com/en-us/122718
- https://support.apple.com/en-us/122719
- https://www.hkcert.org/tc/security-bulletin/apple-products-multiple-vulnerabilities_20250513
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8176
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24111
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24142
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24144
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24155
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24220
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24222 (to CVE-2025-24223)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24225
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24258 (to CVE-2025-24259)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24274
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26465 (to CVE-2025-26466)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30440
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30442 (to CVE-2025-30443)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30448
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30453
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31196
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204 (to CVE-2025-31210)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31212 (to CVE-2025-31215)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31217 (to CVE-2025-31228)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31232 (to CVE-2025-31242)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31244 (to CVE-2025-31247)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31249 (to CVE-2025-31251)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31253
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31256 (to CVE-2025-31260)