{"id":8574,"date":"2025-02-11T04:25:33","date_gmt":"2025-02-11T04:25:33","guid":{"rendered":"https:\/\/howtogeek.blog\/cs\/?p=8574"},"modified":"2025-02-11T04:25:33","modified_gmt":"2025-02-11T04:25:33","slug":"apple-releases-ios-1831-update-to-address-critical-usb-security-vulnerability","status":"publish","type":"post","link":"https:\/\/howtogeek.blog\/cs\/apple-releases-ios-1831-update-to-address-critical-usb-security-vulnerability\/","title":{"rendered":"Apple vyd\u00e1v\u00e1 aktualizaci iOS 18.3.1, kter\u00e1 \u0159e\u0161\u00ed kritickou chybu zabezpe\u010den\u00ed USB"},"content":{"rendered":"<h2>Nal\u00e9hav\u00e1 aktualizace zabezpe\u010den\u00ed spole\u010dnosti Apple pro iPhony a iPady: Co pot\u0159ebujete v\u011bd\u011bt<\/h2>\n<p>Jako z\u00e1sadn\u00ed krok ke zv\u00fd\u0161en\u00ed bezpe\u010dnosti za\u0159\u00edzen\u00ed <strong>Apple<\/strong> vydal nal\u00e9havou aktualizaci zabezpe\u010den\u00ed <strong>iOS 18.3.1<\/strong> pro <strong>iPhony<\/strong> a <strong>iPady<\/strong>. Tato z\u00e1sadn\u00ed oprava \u0159e\u0161\u00ed v\u00fdznamnou zranitelnost zn\u00e1mou jako <strong>CVE-2025-24200<\/strong>, kter\u00e1 by mohla \u00fato\u010dn\u00edk\u016fm umo\u017enit obej\u00edt bezpe\u010dnostn\u00ed funkci <strong>USB Restricted Mode<\/strong> na uzam\u010den\u00fdch za\u0159\u00edzen\u00edch. Tato aktualizace se st\u00e1v\u00e1 nezbytnou zejm\u00e9na pro u\u017eivatele iPhone XS a nov\u011bj\u0161\u00edch model\u016f, stejn\u011b jako nejnov\u011bj\u0161\u00edch iPad Pro, iPad Air a iPad mini.<\/p>\n<h2>Hrozba: Porozum\u011bn\u00ed CVE-2025-24200<\/h2>\n<p><strong>Omezen\u00fd re\u017eim USB<\/strong> je d\u016fle\u017eit\u00fdm bezpe\u010dnostn\u00edm mechanismem na za\u0159\u00edzen\u00edch iOS, kter\u00fd vy\u017eaduje, aby u\u017eivatel\u00e9 p\u0159ed nav\u00e1z\u00e1n\u00edm p\u0159ipojen\u00ed USB zadali p\u0159\u00edstupov\u00fd k\u00f3d za\u0159\u00edzen\u00ed. Toto zabezpe\u010den\u00ed je kl\u00ed\u010dov\u00e9 pro zma\u0159en\u00ed neopr\u00e1vn\u011bn\u00e9ho p\u0159\u00edstupu k citliv\u00fdm \u00fadaj\u016fm. Hl\u00e1\u0161en\u00e1 chyba zabezpe\u010den\u00ed bohu\u017eel umo\u017e\u0148uje potenci\u00e1ln\u00ed zneu\u017eit\u00ed fyzick\u00fdmi prost\u0159edky k deaktivaci t\u00e9to bezpe\u010dnostn\u00ed funkce.<\/p>\n<blockquote>\n<p>\u201eApple si je v\u011bdom zpr\u00e1vy, \u017ee tento probl\u00e9m mohl b\u00fdt zneu\u017eit p\u0159i extr\u00e9mn\u011b sofistikovan\u00e9m \u00fatoku proti konkr\u00e9tn\u00edm c\u00edlen\u00fdm jednotlivc\u016fm.\u201c \u2014 <a href=\"https:\/\/support.apple.com\/en-us\/HT201222.com\">Apple Security Advisory<\/a><\/p>\n<\/blockquote>\n<h2>Vhled do t\u011b\u017eby<\/h2>\n<p>Tuto zranitelnost vynesl na sv\u011btlo <strong>Bill Marczak<\/strong> z <strong>Citizen Lab<\/strong>, proslul\u00fd odhalov\u00e1n\u00edm vysoce profilovan\u00fdch zero-day exploit\u016f, kter\u00e9 c\u00edl\u00ed na konkr\u00e9tn\u00ed jednotlivce. A\u010dkoli Apple neprozradil vy\u010derp\u00e1vaj\u00edc\u00ed podrobnosti t\u00fdkaj\u00edc\u00ed se zneu\u017e\u00edv\u00e1n\u00ed, jejich charakterizace naru\u0161en\u00ed jako \u201eextr\u00e9mn\u011b sofistikovan\u00e9\u201c a \u00famysln\u00e9 nazna\u010duje znepokojiv\u00e9 potenci\u00e1ln\u00ed spojen\u00ed se st\u00e1tem sponzorovan\u00fdmi sledovac\u00edmi aktivitami.<\/p>\n<h2>Proaktivn\u00ed bezpe\u010dnostn\u00ed opat\u0159en\u00ed spole\u010dnosti Apple<\/h2>\n<p>Tato verze je pokra\u010dov\u00e1n\u00edm trval\u00e9ho z\u00e1vazku spole\u010dnosti Apple v oblasti bezpe\u010dnosti u\u017eivatel\u016f. V posledn\u00edch letech byla spole\u010dnost ostra\u017eit\u00e1 a jen v roce 2024 \u0159e\u0161ila \u0161est zranitelnost\u00ed zero-day. P\u0159edchoz\u00ed rok 2023 zaznamenal p\u016fsobiv\u00fdch 20 vy\u0159e\u0161en\u00fdch takov\u00fdch probl\u00e9m\u016f. Rychl\u00fd sled t\u011bchto aktualizac\u00ed podtrhuje v\u0161udyp\u0159\u00edtomnou bitvu mezi odborn\u00edky na kybernetickou bezpe\u010dnost, \u0161kodliv\u00fdmi subjekty a technologick\u00fdmi spole\u010dnostmi v jejich \u00fasil\u00ed o ochranu u\u017eivatelsk\u00fdch informac\u00ed.<\/p>\n<h2>Jak aktualizovat sv\u00e9 za\u0159\u00edzen\u00ed<\/h2>\n<p>Vzhledem k nal\u00e9havosti t\u00e9to aktualizace se u\u017eivatel\u016fm d\u016frazn\u011b doporu\u010duje, aby okam\u017eit\u011b provedli n\u00e1sleduj\u00edc\u00ed kroky:<\/p>\n<ul>\n<li>Otev\u0159ete na sv\u00e9m za\u0159\u00edzen\u00ed aplikaci <strong>Nastaven\u00ed<\/strong>.<\/li>\n<li>Vyberte <strong>Obecn\u00e9<\/strong>.<\/li>\n<li>Klepn\u011bte na <strong>Aktualizace softwaru<\/strong>.<\/li>\n<li>St\u00e1hn\u011bte a nainstalujte aktualizaci <strong>iOS 18.3.1<\/strong>.<\/li>\n<\/ul>\n<p>Okam\u017eit\u00e1 aktualizace nejen chr\u00e1n\u00ed osobn\u00ed \u00fadaje, ale tak\u00e9 podtrhuje odhodl\u00e1n\u00ed <strong>spole\u010dnosti Apple<\/strong> rychle \u0159e\u0161it kritick\u00e9 bezpe\u010dnostn\u00ed hrozby. Tato aktualizace m\u011bn\u00ed hru v ochran\u011b soukrom\u00ed u\u017eivatel\u016f a zabezpe\u010den\u00ed citliv\u00fdch informac\u00ed.<\/p>\n<p>Z\u016fsta\u0148te informov\u00e1ni o budouc\u00edch aktualizac\u00edch a bezpe\u010dnostn\u00edch opat\u0159en\u00edch, kter\u00e1 spole\u010dnost Apple implementuje. Dal\u0161\u00ed podrobnosti najdete v ofici\u00e1ln\u00edm <a href=\"https:\/\/support.apple.com\/en-us\/HT201222.com\" rel=\"noopener noreferrer nofollow\">bezpe\u010dnostn\u00edm doporu\u010den\u00ed<\/a> spole\u010dnosti Apple nebo se m\u016f\u017eete dozv\u011bd\u011bt v\u00edce o <a href=\"https:\/\/nerdschalk.com\/apple-rushes-out-ios-18-3-1-update-to-patch-critical-usb-security-flaw\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">v\u00fdzkumu Citizen Lab<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nal\u00e9hav\u00e1 aktualizace zabezpe\u010den\u00ed spole\u010dnosti Apple pro iPhony a iPady: Co pot\u0159ebujete v\u011bd\u011bt Jako z\u00e1sadn\u00ed krok ke zv\u00fd\u0161en\u00ed bezpe\u010dnosti za\u0159\u00edzen\u00ed Apple vydal nal\u00e9havou aktualizaci zabezpe\u010den\u00ed iOS 18.3.1 pro iPhony a iPady. Tato z\u00e1sadn\u00ed oprava \u0159e\u0161\u00ed v\u00fdznamnou zranitelnost zn\u00e1mou jako CVE-2025-24200, kter\u00e1 by mohla \u00fato\u010dn\u00edk\u016fm umo\u017enit obej\u00edt bezpe\u010dnostn\u00ed funkci USB Restricted Mode na uzam\u010den\u00fdch za\u0159\u00edzen\u00edch. Tato aktualizace [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[32],"class_list":["post-8574","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-apple"],"acf":[],"_links":{"self":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/8574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/comments?post=8574"}],"version-history":[{"count":1,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/8574\/revisions"}],"predecessor-version":[{"id":8575,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/8574\/revisions\/8575"}],"wp:attachment":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/media?parent=8574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/categories?post=8574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/tags?post=8574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}