描述:
Apple 发布了iOS 26.4、iPadOS 26.4、iOS 18.7.7、iPadOS 18.7.7、macOS Sequoia 15.7.5、macOS Sonoma 14.8.5、macOS Tahoe 26.4、Safari 26.4、tvOS 26.4、visionOS 26.4、watchOS 26.4 及 Xcode 26.4 ,以应对不同 Apple 装置的多个漏洞。有关漏洞资料的列表,请参考以下网址:
https://support.apple.com/en-us/126792
https://support.apple.com/en-us/126793
https://support.apple.com/en-us/126794
https://support.apple.com/en-us/126795
https://support.apple.com/en-us/126796
https://support.apple.com/en-us/126797
https://support.apple.com/en-us/126798
https://support.apple.com/en-us/126799
https://support.apple.com/en-us/126800
https://support.apple.com/en-us/126801
受影响的系统:
- iPhone XS 及之后的型号、iPhone 11 及之后的型号
- iPad 第 7 代及之后的型号、iPad 第 8 代及之后的型号、iPad Air 3 及之后的型号、iPad mini 第 5 代及之后的型号、iPad Pro 11 吋第 1 代及之后的型号、iPad Pro 12.9 吋第 3 代及之后的型号
- macOS Sequoia 15.7.5 之前的版本
- macOS Sonoma 14.8.5 之前的版本
- macOS Tahoe 26.4 之前的版本
- Safari 26.4 之前的版本
- tvOS 26.4 之前的版本
- visionOS 26.4 之前的版本
- watchOS 26.4 之前的版本
- Xcode 26.4 之前的版本
影响:
成功利用漏洞可以导致受影响的系统发生服务被拒绝、权限提升、泄漏资讯、绕过保安限制或篡改,视乎攻击者利用哪些漏洞而定。
建议:
现已有适用于受影响产品的修补程式。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
用户可透过产品本身的自动更新来获得更新。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://support.apple.com/en-us/126792
- https://support.apple.com/en-us/126793
- https://support.apple.com/en-us/126794
- https://support.apple.com/en-us/126795
- https://support.apple.com/en-us/126796
- https://support.apple.com/en-us/126797
- https://support.apple.com/en-us/126798
- https://support.apple.com/en-us/126799
- https://support.apple.com/en-us/126800
- https://support.apple.com/en-us/126801
- https://www.hkcert.org/tc/security-bulletin/apple-products-multiple-vulnerabilities_20260325
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43376
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43534
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59775
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20607
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20631 (to CVE-2026-20633)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20637
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20639
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20651
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20657
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20660
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664 (to CVE-2026-20665)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20668
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20687 (to CVE-2026-20688)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20690 (to CVE-2026-20695)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20697 (to CVE-2026-20699)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28816 (to CVE-2026-28818)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28820 (to CVE-2026-28829)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28831 (to CVE-2026-28835)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28837 (to CVE-2026-28839)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28841 (to CVE-2026-28842)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28844 (to CVE-2026-28845)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28852
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28856 (to CVE-2026-28859)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861 (to CVE-2026-28868)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28870 (to CVE-2026-28871)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28874 (to CVE-2026-28882)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28888 (to CVE-2026-28895)