TechCrunch News 04月17日 03:01
Apple says zero-day bugs exploited against ‘specific targeted individuals’ using iOS
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

苹果公司发布了针对其产品线的软件更新,以修复两个可能被用于攻击iOS用户的安全漏洞。这些漏洞被称为“零日”漏洞,因为它们在被利用时才被苹果公司发现。苹果公司表示,这些漏洞可能被用于针对特定iOS用户的复杂攻击。虽然目前尚未确定攻击的幕后黑手或受影响用户的数量,但谷歌威胁分析小组的参与表明,这些攻击可能与政府支持的网络攻击有关。苹果已经发布了包括iOS、macOS、Apple TV和Vision Pro在内的多个系统的更新,以修复这些漏洞。

🐞 苹果公司修复了两个“零日”漏洞,这些漏洞可能被用于针对iOS用户的复杂攻击。由于这些漏洞在被利用时才被苹果公司发现,因此被称为“零日”漏洞。

🎧 其中一个漏洞影响CoreAudio,CoreAudio是苹果用于处理音频的系统级组件。该漏洞可能通过处理恶意媒体文件中的音频流来执行恶意代码。

🔓 另一个漏洞允许攻击者绕过指针身份验证,这是一种安全功能,旨在阻止攻击者在设备内存中注入恶意代码。苹果公司独自发现了这个漏洞。

🛡️ 谷歌威胁分析小组的参与表明,这些攻击可能与政府支持的网络攻击有关。苹果已经发布了iOS、macOS、Apple TV和Vision Pro的软件更新,以修复这些漏洞。

Apple has released new software updates across its product line to fix two security vulnerabilities, which the company said may have been actively used to hack customers running its mobile software, iOS.

In security advisories posted on its website, Apple confirmed it fixed the two zero-day vulnerabilities, which “may have been exploited in an extremely sophisticated attack against specific targeted individuals on iOS.”

The bugs are considered zero days because they were unknown to Apple as they were being exploited.

It’s not yet known who is behind the attacks or how many Apple customers were targeted, or if any were successfully compromised. A spokesperson for Apple did not return TechCrunch’s inquiry. 

Apple credited the discovery of one of the two bugs to security researchers working at Google’s Threat Analysis Group, which investigates government-backed cyberattacks. This may indicate that the attacks targeting Apple customers were launched or coordinated by a nation state or government agency. Some government-backed cyberattacks are known to involve the use of remotely planted spyware and other phone-unlocking devices.

A Google spokesperson did not immediately comment when reached by TechCrunch.

Apple said that one of the bugs affects Apple’s CoreAudio, the system-level component that Apple uses across its various products to allow developers to interact with device audio. Apple said the bug could be exploited by processing an audio stream in a maliciously crafted media file, which can allow the execution of malicious code on an affected Apple device. 

The other bug, which Apple took sole credit for discovering, allows an attacker to bypass pointer authentication, a security feature that Apple uses in its software to make it more difficult for attackers to corrupt or otherwise inject malicious code into a device’s memory.

Apple released a software update for macOS Sequoia, bumping the software version to 15.4.1, and released iOS 18.4.1 that fixes the security bugs in iPhones and iPads. Apple TV and the company’s mixed-reality headset Vision Pro also received the same security updates.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

苹果 安全漏洞 iOS 零日漏洞 软件更新
相关文章