CVE-2026-20643:Apple WebKit 同源策略绕过漏洞通过 Background Security Improvements 机制修复
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要用“文章内容总结”这样的开头。首先,我得仔细阅读这篇文章,了解主要内容。 文章讲的是苹果修复了一个WebKit的高危漏洞,编号CVE-2026-20643。这个漏洞可以让恶意网页绕过同源策略,导致用户信息泄露。漏洞是由安全研究员Thomas Espach发现的,存在于Navigation API中。 苹果通过Background Security Improvements机制快速发布了补丁,影响了iOS和macOS的最新版本。用户需要确保自动更新开启,否则设备可能暴露在风险中。 好的,现在我要把这些要点浓缩到100字以内。重点包括:苹果修复WebKit漏洞、CVE编号、漏洞影响、补丁机制、用户需开启自动更新。 确保语言简洁明了,不使用复杂术语,同时涵盖关键信息。 </think> Apple修复了WebKit高危漏洞CVE-2026-20643,该漏洞可使恶意网页绕过同源策略窃取用户数据。补丁通过Background Security Improvements快速发布至iOS和macOS最新版本。用户需确保自动更新功能开启以保持防护。 2026-3-18 15:28:22 Author: cybersecuritynews.com(查看原文) 阅读量:1 收藏

Apple WebKit Vulnerability Enables Malicious Web Content Bypass on iOS and macOS
Apple WebKit Vulnerability Enables Malicious Web Content Bypass on iOS and macOS

Apple has released critical security patches to address a high-severity WebKit vulnerability that allows maliciously crafted web content to bypass the Same Origin Policy.

Released on March 17, 2026, these updates apply to the latest versions of Apple’s mobile and desktop operating systems.

The patch is delivered through the Background Security Improvements mechanism, ensuring devices receive rapid protection without requiring a lengthy system reboot or a major software update installation.

Apple WebKit Vulnerability CVE-2026-20643

Discovered and reported by security researcher Thomas Espach, the vulnerability is officially tracked as CVE-2026-20643. The flaw originates from a cross-origin issue within the Navigation API of the WebKit framework stack.

Under normal circumstances, the Same Origin Policy acts as a fundamental security boundary in modern web browsers. It restricts how a document or script loaded by one origin can interact with resources from another origin.

When threat actors successfully bypass this mechanism using maliciously crafted web content. They can potentially steal authentication tokens, hijack user sessions, or exfiltrate private information from trusted websites the victim is currently visiting.

google

Apple engineers addressed the underlying Navigation API weakness by implementing improved input validation, successfully closing the loophole that allowed improper cross-origin navigation.

Rather than waiting for the next major software release, Apple distributed this fix as a Background Security Improvement.

Introduced with the 26.1 operating system versions, these lightweight updates deliver crucial security protections for components like the Safari browser, the WebKit framework stack, and various system libraries.

This rapid-response system allows Apple to patch highly severe vulnerabilities seamlessly between standard update cycles.

If a user experiences rare compatibility issues after a patch is applied, they can temporarily remove the improvement.

Doing so reverts the device to the baseline software update until the patch is formally enhanced and integrated into a subsequent major release.

The rapid updates apply specifically to iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. To ensure devices remain protected against this WebKit vulnerability, users should verify that their settings are configured to accept ongoing patches automatically.

Users can manage these configurations by navigating to the Privacy & Security menu in their device settings.

On iPhones and iPads, this is located directly in the main Settings app. At the same time, Mac users can access it through System Settings via the Apple menu.

From there, selecting the Background Security Improvements option allows users to confirm that the “Automatically Install” feature is turned on.

Turning off this setting leaves devices vulnerable to cross-origin attacks until a standard software update is manually installed.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews


文章来源: https://cybersecuritynews.com/apple-webkit-vulnerability/
如有侵权请联系:admin#unsafe.sh