HomeNewsSafari 26.3 Security Update: Apple Patches 6 Critical Vulnerabilities Threatening macOS Users

Safari 26.3 Security Update: Apple Patches 6 Critical Vulnerabilities Threatening macOS Users

Published on

Claude’s Agent Harness Patterns Are Rewriting Developer Assumptions About What AI Can Handle Alone

That’s Anthropic’s confirmed BrowseComp score for Claude Opus 4.6 running with a multi-agent harness, web search, compaction triggered at 50,000 tokens, and max reasoning effort.

Quick Brief

  • Safari 26.3 patches 6 vulnerabilities including arbitrary file writing and history access flaws
  • Update released February 11, 2026 for macOS Sonoma and macOS Sequoia exclusively
  • WebKit received 5 separate fixes addressing denial-of-service and process crash risks
  • CFNetwork vulnerability (CVE-2026-20660) allowed remote attackers to write arbitrary files

Apple released Safari 26.3 on February 11, 2026, addressing six security vulnerabilities that exposed macOS Sonoma and Sequoia users to privacy breaches and system crashes. The update arrives one day after the release, signaling Apple’s accelerated response to emerging threats. Safari history exposure and arbitrary file writing represented the most severe risks in this patch cycle.

Critical Vulnerabilities Addressed

CFNetwork Arbitrary File Writing Flaw

CVE-2026-20660 enabled remote users to write arbitrary files to affected systems through a path handling defect. Apple resolved this by implementing improved logic in CFNetwork’s file management processes. Security researcher Amy discovered this vulnerability, which carried significant implications for system integrity. The flaw could have allowed attackers to place malicious executables in critical system directories without user interaction.

Safari History Access Vulnerability

A logic issue in Safari (CVE-2026-20656) permitted applications to access users’ browsing history without authorization. Mickey Jin identified this privacy-compromising vulnerability that Apple fixed through improved validation mechanisms. This represents a critical breach of user privacy expectations, as browsing history contains sensitive information about user behavior, financial transactions, and personal research patterns.

WebKit Security Fixes

Denial-of-Service Vulnerabilities

WebKit received five separate patches targeting memory handling and state management issues. CVE-2026-20652, discovered by Nathaniel Oh, addressed a denial-of-service vulnerability triggered by remote attackers. The flaw exploited boundary errors when processing HTML content, causing browser crashes. Similar vulnerabilities (CVE-2026-20635, CVE-2026-20636, CVE-2026-20644) discovered by researchers EntryHi and the TSDubhe team followed identical attack patterns.

Process Crash and Tracking Risks

CVE-2026-20608 enabled maliciously crafted web content to trigger unexpected process crashes through poor state management. Tom Van Goethem identified CVE-2026-20676, which allowed websites to track users through Safari web extensions by exploiting state management weaknesses. Apple addressed both through improved state management protocols.

Affected Systems and Deployment

Safari 26.3 exclusively supports macOS Sonoma and macOS Sequoia. The update does not extend to iOS, iPadOS, or visionOS platforms, which receive security patches through their respective operating system updates. macOS Tahoe 26.3 received a parallel security update on the same date, addressing overlapping vulnerabilities including CVE-2026-20656.

Update Installation Process

macOS users receive Safari 26.3 through System Settings under Software Update. The update installs independently of full system updates, allowing faster deployment of browser security fixes. Apple recommends immediate installation for all macOS Sonoma and Sequoia users to mitigate active exploitation risks.

Context: Recent Safari Security Trends

Safari 26.2, released December 12, 2025, patched two zero-day vulnerabilities (CVE-2025-43529 and CVE-2025-14174) that Apple confirmed were exploited in sophisticated targeted attacks. Google Threat Analysis Group collaborated on discovering these WebKit use-after-free and memory corruption flaws. The rapid succession of critical security updates signals an escalating threat landscape for browser engines in early 2026.

Security Research Recognition

Apple acknowledged contributions from security researchers across multiple organizations. The TSDubhe team and Nan Wang (@eternalsakura13) received recognition for identifying multiple WebKit vulnerabilities. Independent researchers EntryHi, Mickey Jin, and Nathaniel Oh contributed critical vulnerability disclosures. Apple’s security response process includes coordination with researchers like David Wood, Luigino Camastra of Aisle Research, and Vsevolod Kokorin of Solidlab.

Vulnerability Impact Assessment

CVE Identifier Component Impact Severity
CVE-2026-20660  CFNetwork Arbitrary file writing Critical
CVE-2026-20656  Safari History access High
CVE-2026-20652  WebKit Denial-of-service Medium
CVE-2026-20608  WebKit Process crash Medium
CVE-2026-20676  WebKit User tracking Medium
CVE-2026-20644/636/635  WebKit Process crash Medium

Apple’s Security Disclosure Policy

Apple maintains a policy of withholding security vulnerability details until investigations conclude and patches deploy. The company references vulnerabilities by CVE identifiers when available and publishes comprehensive documentation on its security releases page. This approach balances transparency with customer protection by preventing exploitation windows between disclosure and patching.

Frequently Asked Questions (FAQs)

How do I install Safari 26.3 on macOS?

Open System Settings on your Mac, navigate to General > Software Update, and click Update Now when Safari 26.3 appears. The update installs automatically without requiring a system restart.

Does Safari 26.3 work on older macOS versions?

No, Safari 26.3 exclusively supports macOS Sonoma and macOS Sequoia. Users on earlier macOS versions must upgrade their operating system to receive this security update.

What is the most severe vulnerability in Safari 26.3?

CVE-2026-20660 in CFNetwork represents the most critical risk, allowing remote attackers to write arbitrary files to your system without authorization through path handling exploitation.

Should I update Safari immediately?

Yes, Apple recommends immediate installation for all macOS Sonoma and Sequoia users. The vulnerabilities addressed include active privacy and security risks that could compromise browsing data.

Were any Safari 26.3 vulnerabilities exploited before patching?

Apple has not confirmed active exploitation of Safari 26.3 vulnerabilities. However, previous Safari versions (26.2) experienced confirmed zero-day exploitation in targeted attacks.

Does Safari 26.3 include new features?

Safari 26.3 is a security-focused update containing only vulnerability patches. No new features or functionality improvements were included in this release.

How often does Apple release Safari security updates?

Apple releases Safari security updates on an as-needed basis, typically within weeks of discovering critical vulnerabilities. Recent patterns show updates every 4-8 weeks during high-threat periods.

Can I verify which Safari version I’m running?

Open Safari, click Safari in the menu bar, select About Safari, and view your version number. Safari 26.3 displays as “Version 26.3” in this dialog.

Mohammad Kashif
Mohammad Kashif
Senior Technology Analyst and Writer at AdwaitX, specializing in the convergence of Mobile Silicon, Generative AI, and Consumer Hardware. Moving beyond spec sheets, his reviews rigorously test "real-world" metrics analyzing sustained battery efficiency, camera sensor behavior, and long-term software support lifecycles. Kashif’s data-driven approach helps enthusiasts and professionals distinguish between genuine innovation and marketing hype, ensuring they invest in devices that offer lasting value.

Latest articles

Claude’s Agent Harness Patterns Are Rewriting Developer Assumptions About What AI Can Handle Alone

That’s Anthropic’s confirmed BrowseComp score for Claude Opus 4.6 running with a multi-agent harness, web search, compaction triggered at 50,000 tokens, and max reasoning effort.

Xcode 26.5 Beta Ships Swift 6.3 and an iOS SDK That Lays Groundwork for Maps Ads

Xcode 26.5 beta (17F5012f) arrived on March 30, 2026, and it carries more developer impact than a typical point release. Swift 6.3 ships as the new default compiler, five platform SDKs move forward simultaneously, and

macOS Tahoe 26.5 Beta 1 Quietly Tests RCS Encryption Again and Lays the Foundation for Apple Maps Ads

Apple released macOS Tahoe 26.5 Beta 1 on March 29, 2026, less than a week after macOS 26.4 reached Mac hardware worldwide. Most coverage frames this as a routine maintenance drop.

iOS 26.5 Beta Flips RCS Encryption Back On, Puts Ads Inside Apple Maps, and Expands EU Wearable Access

Apple dropped iOS 26.5 beta 1 (build 23F5043g) on March 29, 2026, one week after iOS 26.4 shipped to the public. Siri watchers will find nothing new here. But the update carries three changes significant enough to

More like this

Claude’s Agent Harness Patterns Are Rewriting Developer Assumptions About What AI Can Handle Alone

That’s Anthropic’s confirmed BrowseComp score for Claude Opus 4.6 running with a multi-agent harness, web search, compaction triggered at 50,000 tokens, and max reasoning effort.

Xcode 26.5 Beta Ships Swift 6.3 and an iOS SDK That Lays Groundwork for Maps Ads

Xcode 26.5 beta (17F5012f) arrived on March 30, 2026, and it carries more developer impact than a typical point release. Swift 6.3 ships as the new default compiler, five platform SDKs move forward simultaneously, and

macOS Tahoe 26.5 Beta 1 Quietly Tests RCS Encryption Again and Lays the Foundation for Apple Maps Ads

Apple released macOS Tahoe 26.5 Beta 1 on March 29, 2026, less than a week after macOS 26.4 reached Mac hardware worldwide. Most coverage frames this as a routine maintenance drop.