描述:
Apple 發布了 iOS 15.8.4、iPadOS 15.8.4、iOS 18.3.2、iOS 16.7.11、iPadOS 16.7.11、iPadOS 17.7.6、iOS 18.4、iPadOS 18.4、macOS Sequoia 15.4、macOS Sonoma 14.7.5、Safari 18.4、visionOS 2.4、tvOS 18.4 及 Xcode 16.3,以應對不同 Apple 裝置的多個漏洞。有關漏洞資料的列表,請參考以下網址:
https://support.apple.com/en-us/122345
https://support.apple.com/en-us/122346
https://support.apple.com/en-us/122371
https://support.apple.com/en-us/122372
https://support.apple.com/en-us/122373
https://support.apple.com/en-us/122374
https://support.apple.com/en-us/122375
https://support.apple.com/en-us/122377
https://support.apple.com/en-us/122378
https://support.apple.com/en-us/122379
https://support.apple.com/en-us/122380
有報告指多個漏洞 (CVE-2025-24085、CVE-2025-24200、CVE-2025-24201) 正受到攻擊 。用戶應立即為受影響的系統安裝修補程式,以減低受到網絡攻擊的風險。
受影響的系統:
- iPhone 6S 及之後的型號
- iPad 第 7 代及之後的型號、Air 第 2 代及之後的型號、mini 第 4 代及之後的型號、iPad Pro 9.7 吋、Pro 10.5 吋、Pro 11 吋第 1 代及之後的型號、Pro 12.9 吋第 1 代及之後的型號、Pro 13 吋、iPod touch 第 7 代及之後的型號
- macOS Sequoia 15.4 之前的版本
- macOS Sonoma 14.7.5 之前的版本
- macOS Ventura 13.7.5 之前的版本
- Safari 18.4 之前的版本
- tvOS 18.4 之前的版本
- visionOS 2.4 之前的版本
- Xcode 16.3 之前的版本
影響:
成功利用漏洞可以導致受影響的裝置發生遠端執行程式碼、服務被拒絕、權限提升、泄漏資訊、繞過保安限制、仿冒詐騙或篡改。
建議:
現已有適用於受影響產品的修補程式。受影響系統的用戶應遵從供應商的建議,立即採取行動以降低風險。
用戶可透過產品本身的自動更新來獲得更新。受影響系統的用戶應遵從產品供應商的建議,立即採取行動以降低風險。
進一步資訊:
- https://support.apple.com/en-us/122345
- https://support.apple.com/en-us/122346
- https://support.apple.com/en-us/122371
- https://support.apple.com/en-us/122372
- https://support.apple.com/en-us/122373
- https://support.apple.com/en-us/122374
- https://support.apple.com/en-us/122375
- https://support.apple.com/en-us/122377
- https://support.apple.com/en-us/122378
- https://support.apple.com/en-us/122379
- https://support.apple.com/en-us/122380
- https://www.hkcert.org/tc/security-bulletin/apple-products-multiple-vulnerabilities_20250401
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27043
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9681
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40864
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48958
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54533 (to CVE-2024-54534)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56171
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24085
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24095
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24097
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24148
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24157
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24163 (to CVE-2025-24164)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24167
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24170
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24172 (to CVE-2025-24173)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24178
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24180 (to CVE-2025-24182)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24190 (to CVE-2025-24196)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24198 (to CVE-2025-24205)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24207 (to CVE-2025-24218)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24221
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24226
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24228 (to CVE-2025-24250)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24253 (to CVE-2025-24257)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24259 (to CVE-2025-24267)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24269
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24272 (to CVE-2025-24273)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24276 (to CVE-2025-24283)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27113
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30424 (to CVE-2025-30430)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30432 (to CVE-2025-30435)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30437 (to CVE-2025-30439)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30441
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30443 (to CVE-2025-30444)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30446 (to CVE-2025-30447)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30449 (to CVE-2025-30452)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30454 (to CVE-2025-30458)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30460 (to CVE-2025-30465)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30467
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30479 (to CVE-2025-30471)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31182 (to CVE-2025-31184)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31187 (to CVE-2025-31188)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31191 (to CVE-2025-31192)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31194