Apple Patches iOS Flaw That Stored Deleted Signal Notifications in FBI Forensic Case
嗯,用户让我总结这篇文章,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要快速浏览文章内容。 文章讲的是苹果修复了一个iOS和iPadOS的通知服务漏洞。这个漏洞导致被标记为删除的通知仍然保留在设备上。苹果发布了软件更新来解决这个问题,还提到了一些受影响的设备和版本。 另外,文章提到FBI利用这个漏洞从iPhone中提取了Signal消息的内容,即使应用已经被删除。Signal虽然有选项防止消息内容显示在通知中,但这次事件显示物理访问设备可能泄露敏感数据。 用户的需求是用中文总结,控制在100字以内。所以我要抓住关键点:苹果修复漏洞、问题导致删除通知残留、FBI利用此漏洞提取Signal消息、Signal建议用户采取措施。 然后组织语言,确保简洁明了。可能的结构是:苹果修复漏洞,问题导致通知残留,FBI利用提取Signal消息,Signal建议调整设置。 最后检查字数是否在限制内,并确保没有使用禁止的开头语。 </think> 苹果修复了iOS和iPadOS中的通知服务漏洞,该漏洞可能导致已标记为删除的通知意外保留于设备上。此问题影响多款iPhone和iPad设备,并已通过软件更新解决。此前有报告称FBI利用类似漏洞从iPhone中提取Signal消息内容。 2026-4-23 08:6:0 Author: thehackernews.com(查看原文) 阅读量:13 收藏

Vulnerability / Encryption

Apple has rolled out a software fix for iOS and iPadOS to address a Notification Services flaw that stored notifications marked for deletion on the device.

The vulnerability, tracked as CVE-2026-28950 (CVSS score: N/A), has been described as a logging issue that has been addressed with improved data redaction.

"Notifications marked for deletion could be unexpectedly retained on the device," Apple said in an advisory.

The shortcoming affects the following devices -

  • iPhone 11 and later, iPad Pro 12.9-inch 3rd generation and later, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 8th generation and later, and iPad mini 5th generation and later - Fixed in iOS 26.4.2 and iPadOS 26.4.2
  • iPhone XR, iPhone XS, iPhone XS Max, iPhone 11 (all models), iPhone SE (2nd generation), iPhone 12 (all models), iPhone 13 (all models), iPhone SE (3rd generation), iPhone 14 (all models), iPhone 15 (all models), iPhone 16 (all models), iPhone 16e, iPad mini (5th generation - A17 Pro), iPad (7th generation - A16), iPad Air (3rd - 5th generation), iPad Air 11-inch (M2 - M3), iPad Air 13-inch (M2 - M3), iPad Pro 11-inch (1st generation - M4), iPad Pro 12.9-inch (3rd - 6th generation), and iPad Pro 13-inch (M4) - Fixed in iOS 18.7.8 and iPadOS 18.7.8

The update comes weeks after a report from 404 Media that the U.S. Federal Bureau of Investigation (FBI) managed to forensically extract copies of incoming Signal messages from a defendant's iPhone, even after the app was deleted, by taking advantage of the fact that copies of the content were saved in the device's push notification database.

It's not known why the notifications' content was logged in the device to begin with, but the latest update suggests it was a bug. That said, it's unclear when this issue was introduced, and if there have been prior cases where such data may have been captured by authorities using forensic tools.

While Signal already has an option to prevent the content of incoming messages from being displayed in notifications, the development highlighted how physical access to a device can facilitate the extraction of sensitive data from at-risk users.

"For most app notifications, there's no simple way to easily figure out what metadata might be gleaned from a notification, or if the notification is unencrypted or not," the Electronic Frontier Foundation (EFF) said. "It's also good to reconsider whether any app should be sending you notifications to begin with."

To prevent the message content from showing in notifications, users can navigate to their profile > Notifications > Show, and select one of the following: "Name only" or "No name or message."

"Note that no action is needed for this fix to protect Signal users on iOS," Signal said in a post on X. "Once you install the patch, all inadvertently-preserved notifications will be deleted, and no forthcoming notifications will be preserved for deleted applications."

"We're grateful to Apple for the quick action here, and for understanding and acting on the stakes of this kind of issue. It takes an ecosystem to preserve the fundamental human right to private communication."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/apple-patches-ios-flaw-that-stored.html
如有侵权请联系:admin#unsafe.sh