描述:
Apple 发布了 iOS 15.8.4、iPadOS 15.8.4、iOS 18.3.2、iOS 16.7.11、iPadOS 16.7.11、iPadOS 17.7.6、iOS 18.4、iPadOS 18.4、macOS Sequoia 15.4、macOS Sonoma 14.7.5、Safari 18.4、visionOS 2.4、tvOS 18.4 及 Xcode 16.3,以应对不同 Apple 装置的多个漏洞。有关漏洞资料的列表,请参考以下网址:
https://support.apple.com/en-us/122345
https://support.apple.com/en-us/122346
https://support.apple.com/en-us/122371
https://support.apple.com/en-us/122372
https://support.apple.com/en-us/122373
https://support.apple.com/en-us/122374
https://support.apple.com/en-us/122375
https://support.apple.com/en-us/122377
https://support.apple.com/en-us/122378
https://support.apple.com/en-us/122379
https://support.apple.com/en-us/122380
有报告指多个漏洞 (CVE-2025-24085、CVE-2025-24200、CVE-2025-24201) 正受到攻击 。用户应立即为受影响的系统安装修补程式,以减低受到网络攻击的风险。
受影响的系统:
- iPhone 6S 及之后的型号
- iPad 第 7 代及之后的型号、Air 第 2 代及之后的型号、mini 第 4 代及之后的型号、iPad Pro 9.7 吋、Pro 10.5 吋、Pro 11 吋第 1 代及之后的型号、Pro 12.9 吋第 1 代及之后的型号、Pro 13 吋、iPod touch 第 7 代及之后的型号
- macOS Sequoia 15.4 之前的版本
- macOS Sonoma 14.7.5 之前的版本
- macOS Ventura 13.7.5 之前的版本
- Safari 18.4 之前的版本
- tvOS 18.4 之前的版本
- visionOS 2.4 之前的版本
- Xcode 16.3 之前的版本
影响:
成功利用漏洞可以导致受影响的装置发生远端执行程式码、服务被拒绝、权限提升、泄漏资讯、绕过保安限制、仿冒诈骗或篡改。
建议:
现已有适用于受影响产品的修补程式。受影响系统的用户应遵从供应商的建议,立即採取行动以降低风险。
用户可透过产品本身的自动更新来获得更新。受影响系统的用户应遵从产品供应商的建议,立即採取行动以降低风险。
进一步资讯:
- https://support.apple.com/en-us/122345
- https://support.apple.com/en-us/122346
- https://support.apple.com/en-us/122371
- https://support.apple.com/en-us/122372
- https://support.apple.com/en-us/122373
- https://support.apple.com/en-us/122374
- https://support.apple.com/en-us/122375
- https://support.apple.com/en-us/122377
- https://support.apple.com/en-us/122378
- https://support.apple.com/en-us/122379
- https://support.apple.com/en-us/122380
- https://www.hkcert.org/tc/security-bulletin/apple-products-multiple-vulnerabilities_20250401
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40864
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48958
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54533 (to CVE-2024-54534)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24148
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24157
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24163 (to CVE-2025-24164)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24167
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24170
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24172 (to CVE-2025-24173)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24180 (to CVE-2025-24182)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24190 (to CVE-2025-24196)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24198 (to CVE-2025-24205)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24207 (to CVE-2025-24218)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24221
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24228 (to CVE-2025-24250)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24253 (to CVE-2025-24257)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24259 (to CVE-2025-24267)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24269
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24272 (to CVE-2025-24273)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24276 (to CVE-2025-24283)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30424 (to CVE-2025-30430)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30432 (to CVE-2025-30435)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30437 (to CVE-2025-30439)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30441
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30443 (to CVE-2025-30444)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30446 (to CVE-2025-30447)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30449 (to CVE-2025-30452)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30454 (to CVE-2025-30458)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30460 (to CVE-2025-30465)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30467
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30479 (to CVE-2025-30471)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31182 (to CVE-2025-31184)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31187 (to CVE-2025-31188)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31191 (to CVE-2025-31192)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31194