描述:
Apple 發布了iOS 26.4、iPadOS 26.4、iOS 18.7.7、iPadOS 18.7.7、macOS Sequoia 15.7.5、macOS Sonoma 14.8.5、macOS Tahoe 26.4、Safari 26.4、tvOS 26.4、visionOS 26.4、watchOS 26.4 及 Xcode 26.4 ,以應對不同 Apple 裝置的多個漏洞。有關漏洞資料的列表,請參考以下網址:
https://support.apple.com/en-us/126792
https://support.apple.com/en-us/126793
https://support.apple.com/en-us/126794
https://support.apple.com/en-us/126795
https://support.apple.com/en-us/126796
https://support.apple.com/en-us/126797
https://support.apple.com/en-us/126798
https://support.apple.com/en-us/126799
https://support.apple.com/en-us/126800
https://support.apple.com/en-us/126801
受影響的系統:
- iPhone XS 及之後的型號、iPhone 11 及之後的型號
- iPad 第 7 代及之後的型號、iPad 第 8 代及之後的型號、iPad Air 3 及之後的型號、iPad mini 第 5 代及之後的型號、iPad Pro 11 吋第 1 代及之後的型號、iPad Pro 12.9 吋第 3 代及之後的型號
- macOS Sequoia 15.7.5 之前的版本
- macOS Sonoma 14.8.5 之前的版本
- macOS Tahoe 26.4 之前的版本
- Safari 26.4 之前的版本
- tvOS 26.4 之前的版本
- visionOS 26.4 之前的版本
- watchOS 26.4 之前的版本
- Xcode 26.4 之前的版本
影響:
成功利用漏洞可以導致受影響的系統發生服務被拒絕、權限提升、泄漏資訊、繞過保安限制或篡改,視乎攻擊者利用哪些漏洞而定。
建議:
現已有適用於受影響產品的修補程式。受影響系統的用戶應遵從供應商的建議,立即採取行動以降低風險。
用戶可透過產品本身的自動更新來獲得更新。受影響系統的用戶應遵從供應商的建議,立即採取行動以降低風險。
進一步資訊:
- https://support.apple.com/en-us/126792
- https://support.apple.com/en-us/126793
- https://support.apple.com/en-us/126794
- https://support.apple.com/en-us/126795
- https://support.apple.com/en-us/126796
- https://support.apple.com/en-us/126797
- https://support.apple.com/en-us/126798
- https://support.apple.com/en-us/126799
- https://support.apple.com/en-us/126800
- https://support.apple.com/en-us/126801
- https://www.hkcert.org/tc/security-bulletin/apple-products-multiple-vulnerabilities_20260325
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43376
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43534
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59775
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20607
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20631 (to CVE-2026-20633)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20637
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20639
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20651
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20657
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20660
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664 (to CVE-2026-20665)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20668
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20684
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20687 (to CVE-2026-20688)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20690 (to CVE-2026-20695)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20697 (to CVE-2026-20699)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20701
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28816 (to CVE-2026-28818)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28820 (to CVE-2026-28829)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28831 (to CVE-2026-28835)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28837 (to CVE-2026-28839)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28841 (to CVE-2026-28842)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28844 (to CVE-2026-28845)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28852
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28856 (to CVE-2026-28859)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861 (to CVE-2026-28868)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28870 (to CVE-2026-28871)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28874 (to CVE-2026-28882)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28888 (to CVE-2026-28895)