{"id":8397,"date":"2025-02-11T04:26:37","date_gmt":"2025-02-11T04:26:37","guid":{"rendered":"https:\/\/howtogeek.blog\/lv\/?p=8397"},"modified":"2025-02-11T04:26:37","modified_gmt":"2025-02-11T04:26:37","slug":"apple-releases-ios-1831-update-to-address-critical-usb-security-vulnerability","status":"publish","type":"post","link":"https:\/\/howtogeek.blog\/lv\/apple-releases-ios-1831-update-to-address-critical-usb-security-vulnerability\/","title":{"rendered":"Apple izlai\u017e iOS\u00a018.3.1 atjaunin\u0101jumu, lai nov\u0113rstu kritisko USB dro\u0161\u012bbas ievainojam\u012bbu"},"content":{"rendered":"<h2>Apple steidzams dro\u0161\u012bbas atjaunin\u0101jums iPhone un iPad ier\u012bc\u0113m: kas jums j\u0101zina<\/h2>\n<p>Lai uzlabotu ier\u012b\u010du dro\u0161\u012bbu, <strong>Apple<\/strong> ir izlaidusi steidzamu dro\u0161\u012bbas atjaunin\u0101jumu <strong>iOS 18.3.1 <\/strong><strong>iPhone<\/strong> un <strong>iPad<\/strong> ier\u012bc\u0113m.\u0160is svar\u012bgais iel\u0101ps nov\u0113r\u0161 noz\u012bm\u012bgu ievainojam\u012bbu, kas paz\u012bstama k\u0101 <strong>CVE-2025-24200<\/strong> un kas var \u013caut uzbruc\u0113jiem apiet <strong>USB ierobe\u017eot\u0101 re\u017e\u012bma<\/strong> dro\u0161\u012bbas l\u012bdzekli blo\u0137\u0113t\u0101s ier\u012bc\u0113s.\u0160is atjaunin\u0101jums k\u013c\u016bst b\u016btisks, jo \u012bpa\u0161i iPhone XS un jaun\u0101ku mode\u013cu, k\u0101 ar\u012b jaun\u0101ko iPad Pro, iPad Air un iPad mini lietot\u0101jiem.<\/p>\n<h2>Draudi: izpratne par CVE-2025-24200<\/h2>\n<p>USB <strong>ierobe\u017eotais re\u017e\u012bms<\/strong> ir b\u016btisks dro\u0161\u012bbas meh\u0101nisms iOS ier\u012bc\u0113s, kas liek lietot\u0101jiem pirms USB savienojuma izveides ievad\u012bt ier\u012bces piek\u013cuves kodu.\u0160is aizsardz\u012bbas l\u012bdzeklis ir galvenais, lai nov\u0113rstu nesankcion\u0113tu piek\u013cuvi sensit\u012bviem datiem. Diem\u017e\u0113l zi\u0146ot\u0101 ievainojam\u012bba pie\u013cauj potenci\u0101lu izmanto\u0161anu, izmantojot fiziskus l\u012bdzek\u013cus, lai atsp\u0113jotu \u0161o dro\u0161\u012bbas l\u012bdzekli.<\/p>\n<blockquote>\n<p>&#8220;Apple ir inform\u0113ts par zi\u0146ojumu, ka \u0161\u012b probl\u0113ma, iesp\u0113jams, tika izmantota \u0101rk\u0101rt\u012bgi sare\u017e\u0123\u012bt\u0101 uzbrukum\u0101, kas v\u0113rsts pret konkr\u0113t\u0101m person\u0101m.&#8221; &#8211; <a href=\"https:\/\/support.apple.com\/en-us\/HT201222.com\">Apple dro\u0161\u012bbas padoms.<\/a><\/p>\n<\/blockquote>\n<h2>Ieskats ekspluat\u0101cij\u0101<\/h2>\n<p>Ievainojam\u012bbu atkl\u0101ja <strong>Bils Marczaks<\/strong> no <strong>Citizen Lab<\/strong>, kas ir slavens ar to, ka atkl\u0101ja augsta l\u012bme\u0146a nulles dienas darb\u012bbas, kuru m\u0113r\u0137is ir noteiktas personas. Lai gan Apple nav atkl\u0101jis izsme\u013co\u0161u inform\u0101ciju par izmanto\u0161anu, p\u0101rk\u0101puma raksturojums k\u0101 \u201c\u0101rk\u0101rt\u012bgi sare\u017e\u0123\u012bts\u201d un t\u012b\u0161s nor\u0101da uz satrauco\u0161u iesp\u0113jamo saist\u012bbu ar valsts sponsor\u0113t\u0101m uzraudz\u012bbas darb\u012bb\u0101m.<\/p>\n<h2>Apple proakt\u012bvie dro\u0161\u012bbas pas\u0101kumi<\/h2>\n<p>\u0160is laidiens ir turpin\u0101jums Apple past\u0101v\u012bgajai ap\u0146em\u0161an\u0101s nodro\u0161in\u0101t lietot\u0101ju dro\u0161\u012bbu. P\u0113d\u0113jos gados uz\u0146\u0113mums ir bijis modrs, 2024.gad\u0101 vien nov\u0113r\u0161ot se\u0161as nulles dienas ievainojam\u012bbas. Iepriek\u0161\u0113j\u0101 gad\u0101, 2023.gad\u0101, tika re\u0123istr\u0113ts iespaid\u012bgs 20 \u0161\u0101du probl\u0113mu risin\u0101jums.\u0160o atjaunin\u0101jumu \u0101tr\u0101 sec\u012bba uzsver nep\u0101rtraukto c\u012b\u0146u starp kiberdro\u0161\u012bbas ekspertiem, \u013caunpr\u0101t\u012bg\u0101m strukt\u016br\u0101m un tehnolo\u0123iju uz\u0146\u0113mumiem vi\u0146u centienos aizsarg\u0101t lietot\u0101ju inform\u0101ciju.<\/p>\n<h2>K\u0101 atjaunin\u0101t ier\u012bci<\/h2>\n<p>\u0145emot v\u0113r\u0101 \u0161\u012b atjaunin\u0101juma steidzam\u012bbu, lietot\u0101ji tiek stingri aicin\u0101ti nekav\u0113joties r\u012bkoties, veicot \u0161\u0101das darb\u012bbas:<\/p>\n<ul>\n<li>Sav\u0101 ier\u012bc\u0113 atveriet lietotni <strong>Iestat\u012bjumi.<\/strong><\/li>\n<li>Atlasiet <strong>Visp\u0101r\u012bgi<\/strong>.<\/li>\n<li>Pieskarieties <strong>Programmat\u016bras atjaunin\u0101\u0161ana<\/strong>.<\/li>\n<li>Lejupiel\u0101d\u0113jiet un instal\u0113jiet <strong>iOS 18.3.1<\/strong> atjaunin\u0101jumu.<\/li>\n<\/ul>\n<p>\u0100tra atjaunin\u0101\u0161ana ne tikai aizsarg\u0101 personas datus, bet ar\u012b uzsver <strong>Apple<\/strong> ap\u0146em\u0161anos \u0101tri nov\u0113rst kritiskos dro\u0161\u012bbas apdraud\u0113jumus.\u0160is atjaunin\u0101jums maina lietot\u0101ju priv\u0101tuma un sensit\u012bvas inform\u0101cijas aizsardz\u012bbu.<\/p>\n<p>Esiet inform\u0113ts par Apple turpm\u0101kajiem atjaunin\u0101jumiem un dro\u0161\u012bbas pas\u0101kumiem. Lai ieg\u016btu s\u012bk\u0101ku inform\u0101ciju, varat skat\u012bt Apple ofici\u0101lo <a href=\"https:\/\/support.apple.com\/en-us\/HT201222.com\" rel=\"noopener noreferrer nofollow\">dro\u0161\u012bbas ieteikumu<\/a> vai uzzin\u0101t vair\u0101k par <a href=\"https:\/\/nerdschalk.com\/apple-rushes-out-ios-18-3-1-update-to-patch-critical-usb-security-flaw\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">Citizen Lab p\u0113t\u012bjumu<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple steidzams dro\u0161\u012bbas atjaunin\u0101jums iPhone un iPad ier\u012bc\u0113m: kas jums j\u0101zina Lai uzlabotu ier\u012b\u010du dro\u0161\u012bbu, Apple ir izlaidusi steidzamu dro\u0161\u012bbas atjaunin\u0101jumu iOS 18.3.1 iPhone un iPad ier\u012bc\u0113m.\u0160is svar\u012bgais iel\u0101ps nov\u0113r\u0161 noz\u012bm\u012bgu ievainojam\u012bbu, kas paz\u012bstama k\u0101 CVE-2025-24200 un kas var \u013caut uzbruc\u0113jiem apiet USB ierobe\u017eot\u0101 re\u017e\u012bma dro\u0161\u012bbas l\u012bdzekli blo\u0137\u0113t\u0101s ier\u012bc\u0113s.\u0160is atjaunin\u0101jums k\u013c\u016bst b\u016btisks, jo \u012bpa\u0161i iPhone [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[47],"class_list":["post-8397","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-apple"],"acf":[],"_links":{"self":[{"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/posts\/8397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/comments?post=8397"}],"version-history":[{"count":1,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/posts\/8397\/revisions"}],"predecessor-version":[{"id":8398,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/posts\/8397\/revisions\/8398"}],"wp:attachment":[{"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/media?parent=8397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/categories?post=8397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howtogeek.blog\/lv\/wp-json\/wp\/v2\/tags?post=8397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}