描述:
Apple 发布了 iOS 26.5、iPadOS 26.5、iOS 18.7.9、iPadOS 18.7.9、iPadOS 17.7.11、iOS 16.7.16、iPadOS 16.7.16、iOS 15.8.8、iPadOS 15.8.8、macOS Sequoia 15.7.7、macOS Sonoma 14.8.7、macOS Tahoe 26.5、tvOS 26.5、watchOS 26.5 及 visionOS 26.5,以应对不同 Apple 装置的多个漏洞。有关漏洞资料的列表,请参考以下网址:
https://support.apple.com/en-us/127110
https://support.apple.com/en-us/127111
https://support.apple.com/en-us/127112
https://support.apple.com/en-us/127113
https://support.apple.com/en-us/127114
https://support.apple.com/en-us/127115
https://support.apple.com/en-us/127116
https://support.apple.com/en-us/127117
https://support.apple.com/en-us/127118
https://support.apple.com/en-us/127119
https://support.apple.com/en-us/127120
受影响的系统:
- iPhone XS 及之后的型号、iPhone 6s 及之后的型号
- iPad 第 5 代及之后的型号、iPad Air 2、Air 3 及之后的型号、iPad mini 第 4 代及之后的型号、iPad Pro 9.7 吋、iPad Pro 11 吋第 1 代及之后的型号、iPad Pro 12.9 吋第 1 代及之后的型号
- iPod touch (第 7 代)
- macOS Sequoia 15.7.7 之前的版本
- macOS Sonoma 14.8.7 之前的版本
- macOS Tahoe 26.5 之前的版本
- tvOS 26.5 之前的版本
- visionOS 26.5 之前的版本
- watchOS 26.5 之前的版本
影响:
成功利用漏洞可以导致受影响的系统发生远端执行程式码、服务被拒绝、权限提升、泄漏资讯、绕过保安限制或篡改,视乎攻击者利用哪些漏洞而定。
建议:
现已有适用于受影响产品的修补程式。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
用户可透过产品本身的自动更新来获得更新。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://support.apple.com/en-us/127110
- https://support.apple.com/en-us/127111
- https://support.apple.com/en-us/127112
- https://support.apple.com/en-us/127113
- https://support.apple.com/en-us/127114
- https://support.apple.com/en-us/127115
- https://support.apple.com/en-us/127116
- https://support.apple.com/en-us/127117
- https://support.apple.com/en-us/127118
- https://support.apple.com/en-us/127119
- https://support.apple.com/en-us/127120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43524
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1837
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28840
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28846 (to CVE-2026-28848)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28872 (to CVE-2026-28873)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28877 (to CVE-2026-28878)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28882 (to CVE-2026-28883)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28894
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28897
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28901 (to CVE-2026-28908)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28913 (to CVE-2026-28915)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28917 (to CVE-2026-28920)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28922 (to CVE-2026-28925)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28929 (to CVE-2026-28930)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28936
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28940 (to CVE-2026-28944)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28946 (to CVE-2026-28947)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28950 (to CVE-2026-28959)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28961 (to CVE-2026-28965)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28969
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28971 (to CVE-2026-28972)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28974
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28976 (to CVE-2026-28978)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28983
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28985 (to CVE-2026-28988)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28990 (to CVE-2026-28996)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-39869 (to CVE-2026-39871)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43652 (to CVE-2026-43656)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43658 (to CVE-2026-43661)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43666
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43668