Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Bug in Ubuntu CVE-2026-3888 allows attackers to gain root by exploiting systemd cleanup timing

Experts call for new legislation as food insecurity rises in the UK

Early PFAS exposure is associated with bone density changes in adolescence

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Apple fixes WebKit vulnerability that allows same-origin policy bypass on iOS and macOS
Identity

Apple fixes WebKit vulnerability that allows same-origin policy bypass on iOS and macOS

By March 18, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 18, 2026Vulnerability/Zero-day

Apple fixes WebKit vulnerability

Apple on Tuesday released the first round of background security improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS.

The vulnerability, tracked as CVE-2026-20643 (CVSS score: N/A), is described as a cross-origin issue in WebKit’s Navigation API that can be exploited to bypass the same-origin policy when processing maliciously crafted web content.

This flaw affects iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. This issue is addressed with improved input validation in iOS 26.3.1 (a), iPadOS 26.3.1 (a), macOS 26.3.1 (a), and macOS 26.3.2 (a). Security researcher Thomas Espach is credited with discovering and reporting this flaw.

Apple says the background security improvements are aimed at delivering lightweight security releases for components such as the Safari browser, the WebKit framework stack, and other system libraries through small, ongoing security patches, rather than issuing them as part of larger software updates.

This feature will be supported and enabled in future releases of iOS 26.1, iPadOS 26.1, macOS 26 and later. If compatibility issues are discovered, improvements may be temporarily removed and enhanced in subsequent software updates, Apple added.

Users can control background security improvements from the Privacy & Security menu in the Settings app. To ensure automatic installation, we recommend leaving the Automatic installation option checked.

Please note that if users choose to disable this setting, they will have to wait for the next software update to include the improvements. From that perspective, this feature is similar to Rapid Security Response, which was introduced in iOS 16 as a way to install minor security updates.

“If background security improvements are applied, and you choose to remove them, your device reverts to a baseline software update (such as iOS 26.3) that does not have background security improvements applied,” Apple says in a help document.

This development comes a little more than a month after Apple released a fix for an actively exploited zero-day that affected iOS, iPadOS, macOS Tahoe, tvOS, watchOS, visionOS (CVE-2026-20700, CVSS score: 7.8) and could lead to arbitrary code execution.

Last week, the iPhone maker extended patches for four security flaws (CVE-2023-43010, CVE-2023-43000, CVE-2023-41974, and CVE-2024-23222) that were weaponized as part of the Coruna exploit kit.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCritical flaw in unpatched Telnetd (CVE-2026-32746) enables unauthenticated route RCE over port 23
Next Article Early PFAS exposure is associated with bone density changes in adolescence

Related Posts

Bug in Ubuntu CVE-2026-3888 allows attackers to gain root by exploiting systemd cleanup timing

March 18, 2026

Critical flaw in unpatched Telnetd (CVE-2026-32746) enables unauthenticated route RCE over port 23

March 18, 2026

AI flaws in Amazon Bedrock, LangSmith, and SGLang enable data breaches and RCEs

March 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Bug in Ubuntu CVE-2026-3888 allows attackers to gain root by exploiting systemd cleanup timing

Experts call for new legislation as food insecurity rises in the UK

Early PFAS exposure is associated with bone density changes in adolescence

Apple fixes WebKit vulnerability that allows same-origin policy bypass on iOS and macOS

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.