HomeVulnerabilityApple Fixes WebKit Vulnerability Enabling Similar-Origin Coverage Bypass on iOS and macOS

Apple Fixes WebKit Vulnerability Enabling Similar-Origin Coverage Bypass on iOS and macOS

Apple on Tuesday launched its first spherical of Background Safety Enhancements to handle a security flaw in WebKit that impacts iOS, iPadOS, and macOS.

The vulnerability, tracked as CVE-2026-20643 (CVSS rating: N/A), has been described as a cross-origin challenge in WebKit’s Navigation API that might be exploited to bypass the same-origin coverage when processing maliciously crafted internet content material.

The flaw impacts iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. It has been addressed with improved enter validation in iOS 26.3.1 (a), iPadOS 26.3.1 (a), macOS 26.3.1 (a), and macOS 26.3.2 (a). Safety researcher Thomas Espach has been credited with discovering and reporting the shortcoming.

Apple notes that Background Safety Enhancements are meant for delivering light-weight security releases for elements such because the Safari browser, WebKit framework stack, and different system libraries via smaller, ongoing security patches reasonably than issuing them as a part of bigger software program updates.

The characteristic is supported and enabled for future releases beginning with iOS 26.1, iPadOS 26.1, and macOS 26. In instances the place compatibility points are found, the enhancements could also be briefly eliminated after which enhanced in a subsequent software program replace, Apple provides.

See also  3,000 Apache ActiveMQ servers weak to RCE assaults uncovered on-line

Customers can management Background Safety Enhancements by way of the Privateness and Safety menu within the Settings app. To make sure that they’re robotically put in, it is suggested to maintain the “Mechanically Set up” possibility on.

It is value noting that if customers choose to have this setting disabled, they must wait till the enhancements are included within the subsequent software program replace. Considered in that mild, the characteristic is analogous to Fast Safety Response, which it launched in iOS 16 as a technique to set up minor security updates.

“If a Background Safety Enchancment has been utilized, and also you select to take away it, your gadget reverts to the baseline software program replace (for instance, iOS 26.3) with no Background Safety Enhancements utilized,” Apple famous in a assist doc.

The event comes little over a month after Apple issued fixes for an actively exploited zero-day impacting iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS (CVE-2026-20700, CVSS rating: 7.8) that might lead to arbitrary code execution.

See also  Organizations flip to zero belief, community segmentation as ransomware assaults double

Final week, the iPhone maker additionally expanded patches for 4 security flaws (CVE-2023-43010, CVE-2023-43000, CVE-2023-41974, and CVE-2024-23222) that had been weaponized as a part of the Coruna exploit package.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular