Apple’s Bug Bounty Program
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我得通读一下文章。文章是关于苹果的漏洞赏金计划的。苹果现在提供200万美元的赏金,寻找零点击漏洞。根据苹果官网,他们正在扩大研究范围,增加奖励类别,并引入了旗帜系统,让研究人员能更客观地展示漏洞,并获得更快的奖励。 接下来,文章提到苹果将最高赏金提高到200万美元,针对那些能实现类似复杂间谍软件攻击目标的漏洞链。这是业内前所未有的金额。此外,还有额外奖励机制,比如绕过锁定模式或在测试版软件中发现漏洞,最高奖励可能超过500万美元。 赏金类别也扩展到了更多的攻击面,比如WebKit沙盒逃逸和无线邻近漏洞。苹果还引入了目标旗帜系统,用于证明某些顶级类别的可利用性,并帮助确定奖项资格。提交报告时带有目标旗帜的研究人员将有资格获得加速奖励,在修复可用之前就能处理。 好的,现在我需要把这些信息浓缩到100字以内。要抓住关键点:苹果增加赏金至200万美元,寻找零点击漏洞;扩大研究范围;引入旗帜系统加速奖励;最高可能超过500万美元。 这样应该可以了。 </think> Apple 提高漏洞赏金至 200 万美元,并扩大研究范围和引入旗帜系统以加速奖励发放。 2025-10-15 11:2:18 Author: www.schneier.com(查看原文) 阅读量:9 收藏

Apple’s Bug Bounty Program

Apple is now offering a $2M bounty for a zero-click exploit. According to the Apple website:

Today we’re announcing the next major chapter for Apple Security Bounty, featuring the industry’s highest rewards, expanded research categories, and a flag system for researchers to objectively demonstrate vulnerabilities and obtain accelerated awards.

  1. We’re doubling our top award to $2 million for exploit chains that can achieve similar goals as sophisticated mercenary spyware attacks. This is an unprecedented amount in the industry and the largest payout offered by any bounty program we’re aware of and our bonus system, providing additional rewards for Lockdown Mode bypasses and vulnerabilities discovered in beta software, can more than double this reward, with a maximum payout in excess of $5 million. We’re also doubling or significantly increasing rewards in many other categories to encourage more intensive research. This includes $100,000 for a complete Gatekeeper bypass, and $1 million for broad unauthorized iCloud access, as no successful exploit has been demonstrated to date in either category.
  2. Our bounty categories are expanding to cover even more attack surfaces. Notably, we’re rewarding one-click WebKit sandbox escapes with up to $300,000, and wireless proximity exploits over any radio with up to $1 million.
  3. We’re introducing Target Flags, a new way for researchers to objectively demonstrate exploitability for some of our top bounty categories, including remote code execution and Transparency, Consent, and Control (TCC) bypasses and to help determine eligibility for a specific award. Researchers who submit reports with Target Flags will qualify for accelerated awards, which are processed immediately after the research is received and verified, even before a fix becomes available.

Tags: , , ,

Posted on October 15, 2025 at 7:02 AM0 Comments

Sidebar photo of Bruce Schneier by Joe MacInnis.


文章来源: https://www.schneier.com/blog/archives/2025/10/apples-bug-bounty-program.html
如有侵权请联系:admin#unsafe.sh