描述:
Apple 发布了iOS 26、iPadOS 26、iOS 18.7、iPadOS 18.7、iOS 16.7.12、iPadOS 16.7.12、iOS 15.8.5、iPadOS 15.8.5、macOS Sequoia 15.7、macOS Sonoma 14.8、macOS Tahoe 26、Safari 26、tvOS 26、visionOS 26、watchOS 26 及 Xcode 26,以应对不同 Apple 装置的多个漏洞。有关漏洞资料的列表,请参考以下网址:
https://support.apple.com/en-us/125108
https://support.apple.com/en-us/125109
https://support.apple.com/en-us/125110
https://support.apple.com/en-us/125111
https://support.apple.com/en-us/125112
https://support.apple.com/en-us/125113
https://support.apple.com/en-us/125114
https://support.apple.com/en-us/125115
https://support.apple.com/en-us/125116
https://support.apple.com/en-us/125117
https://support.apple.com/en-us/125141
https://support.apple.com/en-us/125142
有报告指漏洞 (CVE-2025-43300) 正处于被攻击的高风险。用户应立即为受影响的系统安装修补程式,以减低受到网络攻击的风险。
受影响的系统:
- iPhone 6S 及之后的型号
- iPad 第 5 代、iPad 第 7 代及之后的型号、Air 第 2 代及之后的型号、mini 第 4 代、mini 第 5 代及之后的型号、Pro 9.7 吋、Pro 11 吋第 1 代及之后的型号、Pro 12.9 吋第 1 代及之后的型号、Pro 13 吋
- macOS Sequoia 15.7 之前的版本
- macOS Sonoma 14.8 之前的版本
- macOS Tahoe 26 之前的版本
- Safari 26 之前的版本
- tvOS 26 之前的版本
- visionOS 26 之前的版本
- watchOS 26 之前的版本
- Xcode 26 之前的版本
影响:
成功利用漏洞可以导致受影响的系统发生远端执行程式码、服务被拒绝、权限提升、泄漏资讯、绕过保安限制、仿冒诈骗或篡改,视乎攻击者利用哪些漏洞而定。
建议:
现已有适用于受影响产品的修补程式。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
用户可透过产品本身的自动更新来获得更新。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://support.apple.com/en-us/125108
- https://support.apple.com/en-us/125109
- https://support.apple.com/en-us/125110
- https://support.apple.com/en-us/125111
- https://support.apple.com/en-us/125112
- https://support.apple.com/en-us/125113
- https://support.apple.com/en-us/125114
- https://support.apple.com/en-us/125115
- https://support.apple.com/en-us/125116
- https://support.apple.com/en-us/125117
- https://support.apple.com/en-us/125141
- https://support.apple.com/en-us/125142
- https://www.hkcert.org/tc/security-bulletin/apple-products-multiple-vulnerabilities_20250916
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27280
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24197
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30468
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31254 (to CVE-2025-31255)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31259
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31268 (to CVE-2025-31271)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43190
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43203 (to CVE-2025-43204)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43207 (to CVE-2025-43208)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43231
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43262 (to CVE-2025-43263)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272 (to CVE-2025-43273)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43277
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43279
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43285 (to CVE-2025-43287)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43291 (to CVE-2025-43295)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43297 (to CVE-2025-43299)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43300 (to CVE-2025-43305)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43307 (to CVE-2025-43308)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43310 (to CVE-2025-43312)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43314 (to CVE-2025-43319)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43325 (to CVE-2025-43333)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43337
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43340 (to CVE-2025-43344)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43346 (to CVE-2025-43347)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43349
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43353 (to CVE-2025-43359)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43362
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43366 (to CVE-2025-43372)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43375
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48384