U.S. CISA adds Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities catalog
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内。首先,我需要通读整篇文章,抓住主要信息。 文章开头提到美国CISA将Apple、Gladinet CentreStack和Triofox的漏洞加入已知被利用漏洞目录。接着详细介绍了两个漏洞:CVE-2025-43529是Apple WebKit的内存问题,可能导致代码执行;CVE-2025-14611是加密密钥硬编码问题,可能被攻击者利用。 然后,文章提到Apple和Google发布了紧急更新,修复了这些漏洞,并指出攻击可能涉及国家行为者和商业间谍软件。CISA要求联邦机构在2026年1月5日前修复这些漏洞,并建议私营组织也进行检查。 现在,我需要把这些信息浓缩到100字以内。要包括CISA添加了哪些漏洞,每个漏洞的影响,以及修复的时间要求。同时要简洁明了,不需要复杂的句子结构。 可能的结构:CISA将Apple、Gladinet CentreStack和Triofox的漏洞加入目录。Apple的漏洞涉及内存管理问题,可能导致代码执行;Gladinet和Triofox的问题涉及硬编码加密密钥。CISA要求在2026年1月5日前修复这些漏洞。 检查字数是否在限制内,并确保所有关键点都被涵盖。 </think> 美国网络安全和基础设施安全局(CISA)将苹果、Gladinet CentreStack和Triofox的漏洞加入已知被利用漏洞目录。苹果WebKit内存管理问题可能导致代码执行;Gladinet和Triofox硬编码加密密钥问题可被攻击者利用。CISA要求联邦机构于2026年1月5日前修复这些漏洞。 2025-12-15 18:59:59 Author: securityaffairs.com(查看原文) 阅读量:5 收藏

U.S. CISA adds Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities catalog

Pierluigi Paganini December 15, 2025

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities catalog.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Apple and Gladinet CentreStack and Triofox flaws to its Known Exploited Vulnerabilities (KEV) catalog.

Below are the flaws added to the catalog:

  • CVE-2025-43529 – Apple Multiple Products Use-After-Free WebKit Vulnerability;
  • CVE-2025-14611 – Gladinet CentreStack and Triofox Hard Coded Cryptographic Vulnerability;

Last week, Apple and Google both pushed out urgent security updates after uncovering a highly targeted attacks against an unknown number of users. The attacks abused zero‑day vulnerabilities in their software. The campaigns appear to involve nation-state actors and commercial spyware vendors, with a focus on specific high‑value individuals rather than mass exploitation.

Apple released updates for iPhones, iPads, Macs, and more, fixing two WebKit flaws (CVE-2025-14174, CVE-2025-43529) likely exploited in targeted iOS 26 attacks.

“Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26.” states the advisory.

Apple and Google did not provide further information on the attacks. 

The vulnerability CVE-2025-43529 is a use-after-free flaw in Apple’s WebKit engine, the component responsible for processing web content. When WebKit mishandles memory, it may continue to access a portion of memory after it has already been freed. By delivering specially crafted web content, an attacker can trigger this condition, causing memory corruption. In practice, this can lead to application crashes or, in more serious cases, arbitrary code execution. The issue affects Safari and any Apple or third-party applications that rely on WebKit to parse and render HTML across iOS, iPadOS, macOS, and related platforms.

The second issue added to the catalog is CVE-2025-14611, a hardcoded cryptographic keys vulnerability in Gladinet CentreStack and TrioFox, where fixed AES encryption keys are embedded directly in the software. Because these keys are not unique or secret, attackers can recover them and decrypt or manipulate protected data. When this weak encryption is used on publicly exposed endpoints, it significantly reduces security. An unauthenticated attacker can exploit the issue with a specially crafted request to bypass protections and potentially achieve arbitrary local file inclusion, allowing access to sensitive files on the underlying system.

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts also recommend that private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix the vulnerabilities by January 5, 2026.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CISA)




文章来源: https://securityaffairs.com/185716/hacking/u-s-cisa-adds-apple-and-gladinet-centrestack-and-triofox-flaws-to-its-known-exploited-vulnerabilities-catalog.html
如有侵权请联系:admin#unsafe.sh