描述:
Apple 發布了 iOS 26.5、iPadOS 26.5、iOS 18.7.9、iPadOS 18.7.9、iPadOS 17.7.11、iOS 16.7.16、iPadOS 16.7.16、iOS 15.8.8、iPadOS 15.8.8、macOS Sequoia 15.7.7、macOS Sonoma 14.8.7、macOS Tahoe 26.5、tvOS 26.5、watchOS 26.5 及 visionOS 26.5,以應對不同 Apple 裝置的多個漏洞。有關漏洞資料的列表,請參考以下網址:
https://support.apple.com/en-us/127110
https://support.apple.com/en-us/127111
https://support.apple.com/en-us/127112
https://support.apple.com/en-us/127113
https://support.apple.com/en-us/127114
https://support.apple.com/en-us/127115
https://support.apple.com/en-us/127116
https://support.apple.com/en-us/127117
https://support.apple.com/en-us/127118
https://support.apple.com/en-us/127119
https://support.apple.com/en-us/127120
受影響的系統:
- iPhone XS 及之後的型號、iPhone 6s 及之後的型號
- iPad 第 5 代及之後的型號、iPad Air 2、Air 3 及之後的型號、iPad mini 第 4 代及之後的型號、iPad Pro 9.7 吋、iPad Pro 11 吋第 1 代及之後的型號、iPad Pro 12.9 吋第 1 代及之後的型號
- iPod touch (第 7 代)
- macOS Sequoia 15.7.7 之前的版本
- macOS Sonoma 14.8.7 之前的版本
- macOS Tahoe 26.5 之前的版本
- tvOS 26.5 之前的版本
- visionOS 26.5 之前的版本
- watchOS 26.5 之前的版本
影響:
成功利用漏洞可以導致受影響的系統發生遠端執行程式碼、服務被拒絕、權限提升、泄漏資訊、繞過保安限制或篡改,視乎攻擊者利用哪些漏洞而定。
建議:
現已有適用於受影響產品的修補程式。受影響系統的用戶應遵從供應商的建議,立即採取行動以降低風險。
用戶可透過產品本身的自動更新來獲得更新。受影響系統的用戶應遵從供應商的建議,立即採取行動以降低風險。
進一步資訊:
- https://support.apple.com/en-us/127110
- https://support.apple.com/en-us/127111
- https://support.apple.com/en-us/127112
- https://support.apple.com/en-us/127113
- https://support.apple.com/en-us/127114
- https://support.apple.com/en-us/127115
- https://support.apple.com/en-us/127116
- https://support.apple.com/en-us/127117
- https://support.apple.com/en-us/127118
- https://support.apple.com/en-us/127119
- https://support.apple.com/en-us/127120
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43524
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1837
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28840
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28846 (to CVE-2026-28848)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28870
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28872 (to CVE-2026-28873)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28877 (to CVE-2026-28878)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28882 (to CVE-2026-28883)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28894
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28897
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28901 (to CVE-2026-28908)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28913 (to CVE-2026-28915)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28917 (to CVE-2026-28920)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28922 (to CVE-2026-28925)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28929 (to CVE-2026-28930)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28936
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28940 (to CVE-2026-28944)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28946 (to CVE-2026-28947)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28950 (to CVE-2026-28959)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28961 (to CVE-2026-28965)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28969
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28971 (to CVE-2026-28972)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28974
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28976 (to CVE-2026-28978)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28983
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28985 (to CVE-2026-28988)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28990 (to CVE-2026-28996)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-39869 (to CVE-2026-39871)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43652 (to CVE-2026-43656)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43658 (to CVE-2026-43661)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43666
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-43668