描述:
Apple 發布了iOS 26、iPadOS 26、iOS 18.7、iPadOS 18.7、iOS 16.7.12、iPadOS 16.7.12、iOS 15.8.5、iPadOS 15.8.5、macOS Sequoia 15.7、macOS Sonoma 14.8、macOS Tahoe 26、Safari 26、tvOS 26、visionOS 26、watchOS 26 及 Xcode 26,以應對不同 Apple 裝置的多個漏洞。有關漏洞資料的列表,請參考以下網址:
https://support.apple.com/en-us/125108
https://support.apple.com/en-us/125109
https://support.apple.com/en-us/125110
https://support.apple.com/en-us/125111
https://support.apple.com/en-us/125112
https://support.apple.com/en-us/125113
https://support.apple.com/en-us/125114
https://support.apple.com/en-us/125115
https://support.apple.com/en-us/125116
https://support.apple.com/en-us/125117
https://support.apple.com/en-us/125141
https://support.apple.com/en-us/125142
有報告指漏洞 (CVE-2025-43300) 正處於被攻擊的高風險。用戶應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
- iPhone 6S 及之後的型號
- iPad 第 5 代、iPad 第 7 代及之後的型號、Air 第 2 代及之後的型號、mini 第 4 代、mini 第 5 代及之後的型號、Pro 9.7 吋、Pro 11 吋第 1 代及之後的型號、Pro 12.9 吋第 1 代及之後的型號、Pro 13 吋
- macOS Sequoia 15.7 之前的版本
- macOS Sonoma 14.8 之前的版本
- macOS Tahoe 26 之前的版本
- Safari 26 之前的版本
- tvOS 26 之前的版本
- visionOS 26 之前的版本
- watchOS 26 之前的版本
- Xcode 26 之前的版本
影響:
成功利用漏洞可以導致受影響的系統發生遠端執行程式碼、服務被拒絕、權限提升、泄漏資訊、繞過保安限制、仿冒詐騙或篡改,視乎攻擊者利用哪些漏洞而定。
建議:
現已有適用於受影響產品的修補程式。受影響系統的用戶應遵從供應商的建議,立即採取行動以降低風險。
用戶可透過產品本身的自動更新來獲得更新。受影響系統的用戶應遵從供應商的建議,立即採取行動以降低風險。
進一步資訊:
- https://support.apple.com/en-us/125108
- https://support.apple.com/en-us/125109
- https://support.apple.com/en-us/125110
- https://support.apple.com/en-us/125111
- https://support.apple.com/en-us/125112
- https://support.apple.com/en-us/125113
- https://support.apple.com/en-us/125114
- https://support.apple.com/en-us/125115
- https://support.apple.com/en-us/125116
- https://support.apple.com/en-us/125117
- https://support.apple.com/en-us/125141
- https://support.apple.com/en-us/125142
- https://www.hkcert.org/tc/security-bulletin/apple-products-multiple-vulnerabilities_20250916
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27280
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6965
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24088
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24133
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24197
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30468
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31254 (to CVE-2025-31255)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31259
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31268 (to CVE-2025-31271)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40909
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43190
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43203 (to CVE-2025-43204)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43207 (to CVE-2025-43208)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43231
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43262 (to CVE-2025-43263)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272 (to CVE-2025-43273)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43277
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43279
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43283
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43285 (to CVE-2025-43287)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43291 (to CVE-2025-43295)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43297 (to CVE-2025-43299)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43300 (to CVE-2025-43305)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43307 (to CVE-2025-43308)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43310 (to CVE-2025-43312)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43314 (to CVE-2025-43319)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43321
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43325 (to CVE-2025-43333)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43337
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43340 (to CVE-2025-43344)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43346 (to CVE-2025-43347)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43349
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43353 (to CVE-2025-43359)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43362
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43366 (to CVE-2025-43372)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43375
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48384