Apple patches WebKit bug that could let sites access your data
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。首先,我得仔细阅读这篇文章,了解它的主要内容和关键点。 文章讲的是苹果公司发布了一个背景安全改进,修复了一个WebKit漏洞。这个漏洞可能导致恶意网站绕过浏览器保护,访问其他网站的数据。WebKit是苹果的网络渲染引擎,用于Safari、Mail和App Store等应用。 漏洞的具体描述是一个跨源问题,通过改进输入验证来解决。这意味着恶意网站可能伪装成可信的网站,窃取数据。苹果的修复加强了WebKit对跨站导航的检查。 用户需要确保他们的设备运行的是最新版本的操作系统,并启用了背景安全改进功能。对于iOS和iPadOS用户,可以在设置中检查更新;macOS用户则通过系统设置中的隐私与安全部分进行检查。 总结时,我需要涵盖苹果修复了WebKit漏洞、漏洞可能导致的数据泄露风险、修复措施以及用户的应对步骤。同时要保持简洁,不超过100个字。 可能会遗漏一些细节,比如具体的CVE编号或更新版本号,但这些可能不是最关键的信息。重点是传达修复的重要性以及用户需要采取的行动。 最后,确保语言流畅自然,避免使用过于技术化的术语,让所有读者都能理解。 </think> 苹果修复了WebKit漏洞CVE-2026-20643,该漏洞可能导致恶意网站绕过浏览器保护机制访问其他网站数据。此更新作为背景安全改进推出,需确保设备运行最新系统版本并启用相关设置以自动安装安全补丁。 2026-3-18 11:19:59 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

Apple has released a Background Security Improvement to patch a flaw that could allow malicious websites to bypass browser protections and access data from other sites.

What is it?

The patched WebKit vulnerability is described as:

“A cross-origin issue in the Navigation API was addressed with improved input validation.”

WebKit vulnerabilities refer to security flaws in Apple’s web rendering engine, which powers Safari, Mail, and the App Store on iOS and macOS.

What this means is that the CVE-2026-20643 vulnerability makes it possible for a malicious website to pretend to be another site, maybe one you trust, and then read or steal information that should be kept separate. Normally, browsers enforce a rule called the “same‑origin policy,” which is like a strict fence that stops one site from peeking into another site’s data. This bug could help cybercriminals cut through that fence.

In practical terms, an attacker would first have to lure you to a specially crafted web page. If you visited it, that page could try to bypass the normal isolation between sites and access things it should not see, such as data from another tab or embedded content from a different service.

Attackers do not currently appear to exploit this flaw in the wild, but they like to chain issues like this with other bugs to steal accounts or sensitive data, which likely prompted Apple to ship it as a Background Security Improvement. Apple’s fix tightens how WebKit checks and handles cross‑site navigation.

What to do

This patch for a WebKit vulnerability, tracked as CVE-2026-20643, installs on top of versions 26.3.1/26.3.2 and not as a separate full OS version. Background Security Improvements are only available on the latest OS branch (26.x) and apply silently in the background if you’re on the latest version.

For iOS and iPadOS users, you can check if you’re using the latest software version by  going to Settings > General > Software Update. It’s also worth turning on Automatic Updates if you haven’t already. You can do that on the same screen.

For macOS Tahoe users, you can find out if you’re on the latest 26.3 version from the Apple menu. In the upper-left corner of your screen, choose About This Mac. The information shown there includes the macOS name and version number. If you need to know the build number as well, click the version number to see it.

This Background Security Improvement is only available for Mac users running Tahoe 26.3.1 and MacBook Neo users running 26.3.2.

All users have to do is to check if they have the Background Security Improvements option set to enabled.

For iPhone and iPad users, this setting can be found under Privacy & Security, where you can scroll down and look for the Background Security Improvements toggle.

Automatically install security improvements
Automatically install security improvements

On a Mac (macOS Tahoe 26.3.+ only), you can check by following these instructions:

  1. Click the Apple menu > System Settings.
  2. In the sidebar, click Privacy & Security.
  3. Scroll down on the right and click Background Security Improvements.
  4. Make sure Automatically Install is turned on. If it’s off, the Mac won’t get Background Security Improvements until the fixes are rolled into a later full update.

The Install option in my screenshot means that you can speed up the process by clicking it. But it’s fine to wait until it happens automatically.

After the update, your OS version should show 26.3.1 (a), except for MacBook Neos which should be at 26.3.2 (a).


We don’t just report on phone security—we provide it

Cybersecurity risks should never spread beyond a headline. Keep threats off your mobile devices by downloading Malwarebytes for iOS, and Malwarebytes for Android today.

*** This is a Security Bloggers Network syndicated blog from Malwarebytes authored by Malwarebytes. Read the original post at: https://www.malwarebytes.com/blog/news/2026/03/apple-patches-webkit-bug-that-could-let-sites-access-your-data


文章来源: https://securityboulevard.com/2026/03/apple-patches-webkit-bug-that-could-let-sites-access-your-data/
如有侵权请联系:admin#unsafe.sh