描述:
Apple 發布了 iOS 26.1、iPadOS 26.1、macOS Sequoia 15.7.2、macOS Sonoma 14.8.2、macOS Tahoe 26.1、Safari 26.1、tvOS 26.1、visionOS 26.1、watchOS 26.1 及 Xcode 26.1,以應對不同 Apple 裝置的多個漏洞。 有關漏洞資料的列表,請參考以下網址:
https://support.apple.com/en-us/125632
https://support.apple.com/en-us/125634
https://support.apple.com/en-us/125635
https://support.apple.com/en-us/125636
https://support.apple.com/en-us/125637
https://support.apple.com/en-us/125638
https://support.apple.com/en-us/125639
https://support.apple.com/en-us/125640
https://support.apple.com/en-us/125641
受影響的系統:
- iPhone 11 及之後的型號
- iPad 第 8 代及之後的型號、Air 第 3 代及之後的型號、mini 第 5 代及之後的型號、Pro 11 吋第 1 代及之後的型號、Pro 12.9 吋第 3 代及之後的型號
- macOS Sequoia 15.7.2 之前的版本
- macOS Sonoma 14.8.2 之前的版本
- macOS Tahoe 26.1 之前的版本
- Safari 26.1 之前的版本
- tvOS 26.1 之前的版本
- visionOS 26.1 之前的版本
- watchOS 26.1 之前的版本
- Xcode 26.1 之前的版本
影響:
成功利用漏洞可以導致受影響的系統發生遠端執行程式碼、權限提升、泄漏資訊、服務被拒絕、繞過保安限制、仿冒詐騙或篡改,視乎攻擊者利用哪些漏洞而定。
建議:
現已有適用於受影響產品的修補程式。受影響系統的用戶應遵從供應商的建議,立即採取行動以降低風險。
用戶可透過產品本身的自動更新來獲得更新。受影響系統的用戶應遵從供應商的建議,立即採取行動以降低風險。
進一步資訊:
- https://support.apple.com/en-us/125632
- https://support.apple.com/en-us/125634
- https://support.apple.com/en-us/125635
- https://support.apple.com/en-us/125636
- https://support.apple.com/en-us/125637
- https://support.apple.com/en-us/125638
- https://support.apple.com/en-us/125639
- https://support.apple.com/en-us/125640
- https://support.apple.com/en-us/125641
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43398
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-49761
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6442
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30465
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31199
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32462
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43292
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43294
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43322
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43334 (to CVE-2025-43338)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43348
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43350 (to CVE-2025-43351)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43361
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43364
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43372 (to CVE-2025-43373)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43377 (to CVE-2025-43402)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43404 (to CVE-2025-43409)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43411 (to CVE-2025-43414)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43420 (to CVE-2025-43427)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429 (to CVE-2025-43436)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438 (to CVE-2025-43450)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43452
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43454 (to CVE-2025-43455)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457 (to CVE-2025-43469)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43471 (to CVE-2025-43474)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43476 (to CVE-2025-43481)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43493
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43495 (to CVE-2025-43500)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43502 (to CVE-2025-43507)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53906