描述:
Apple 发布了 iOS 26.1、iPadOS 26.1、macOS Sequoia 15.7.2、macOS Sonoma 14.8.2、macOS Tahoe 26.1、Safari 26.1、tvOS 26.1、visionOS 26.1、watchOS 26.1 及 Xcode 26.1,以应对不同 Apple 装置的多个漏洞。 有关漏洞资料的列表,请参考以下网址:
https://support.apple.com/en-us/125632
https://support.apple.com/en-us/125634
https://support.apple.com/en-us/125635
https://support.apple.com/en-us/125636
https://support.apple.com/en-us/125637
https://support.apple.com/en-us/125638
https://support.apple.com/en-us/125639
https://support.apple.com/en-us/125640
https://support.apple.com/en-us/125641
受影响的系统:
- iPhone 11 及之后的型号
- iPad 第 8 代及之后的型号、Air 第 3 代及之后的型号、mini 第 5 代及之后的型号、Pro 11 吋第 1 代及之后的型号、Pro 12.9 吋第 3 代及之后的型号
- macOS Sequoia 15.7.2 之前的版本
- macOS Sonoma 14.8.2 之前的版本
- macOS Tahoe 26.1 之前的版本
- Safari 26.1 之前的版本
- tvOS 26.1 之前的版本
- visionOS 26.1 之前的版本
- watchOS 26.1 之前的版本
- Xcode 26.1 之前的版本
影响:
成功利用漏洞可以导致受影响的系统发生远端执行程式码、权限提升、泄漏资讯、服务被拒绝、绕过保安限制、仿冒诈骗或篡改,视乎攻击者利用哪些漏洞而定。
建议:
现已有适用于受影响产品的修补程式。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
用户可透过产品本身的自动更新来获得更新。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://support.apple.com/en-us/125632
- https://support.apple.com/en-us/125634
- https://support.apple.com/en-us/125635
- https://support.apple.com/en-us/125636
- https://support.apple.com/en-us/125637
- https://support.apple.com/en-us/125638
- https://support.apple.com/en-us/125639
- https://support.apple.com/en-us/125640
- https://support.apple.com/en-us/125641
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43398
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6442
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30465
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31199
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32462
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43292
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43294
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43322
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43334 (to CVE-2025-43338)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43348
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43350 (to CVE-2025-43351)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43361
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43364
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43372 (to CVE-2025-43373)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43377 (to CVE-2025-43402)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43404 (to CVE-2025-43409)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43411 (to CVE-2025-43414)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43420 (to CVE-2025-43427)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429 (to CVE-2025-43436)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438 (to CVE-2025-43450)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43452
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43454 (to CVE-2025-43455)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457 (to CVE-2025-43469)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43471 (to CVE-2025-43474)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43476 (to CVE-2025-43481)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43493
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43495 (to CVE-2025-43500)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43502 (to CVE-2025-43507)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53906