HomeNewsSafari 26.3 Security Update: Apple Patches 6 Critical Vulnerabilities Threatening macOS Users

Safari 26.3 Security Update: Apple Patches 6 Critical Vulnerabilities Threatening macOS Users

Published on

Oracle Stopped Moving Data to AI Agents. Here’s Why That Matters for Enterprises.

Oracle AI Database 26ai first shipped in October 2025 as a long-term support release replacing Oracle Database 23ai. No database upgrade or application recertification was required to transition.

Quick Brief

  • Safari 26.3 patches 6 vulnerabilities including arbitrary file writing and history access flaws
  • Update released February 11, 2026 for macOS Sonoma and macOS Sequoia exclusively
  • WebKit received 5 separate fixes addressing denial-of-service and process crash risks
  • CFNetwork vulnerability (CVE-2026-20660) allowed remote attackers to write arbitrary files

Apple released Safari 26.3 on February 11, 2026, addressing six security vulnerabilities that exposed macOS Sonoma and Sequoia users to privacy breaches and system crashes. The update arrives one day after the release, signaling Apple’s accelerated response to emerging threats. Safari history exposure and arbitrary file writing represented the most severe risks in this patch cycle.

Critical Vulnerabilities Addressed

CFNetwork Arbitrary File Writing Flaw

CVE-2026-20660 enabled remote users to write arbitrary files to affected systems through a path handling defect. Apple resolved this by implementing improved logic in CFNetwork’s file management processes. Security researcher Amy discovered this vulnerability, which carried significant implications for system integrity. The flaw could have allowed attackers to place malicious executables in critical system directories without user interaction.

Safari History Access Vulnerability

A logic issue in Safari (CVE-2026-20656) permitted applications to access users’ browsing history without authorization. Mickey Jin identified this privacy-compromising vulnerability that Apple fixed through improved validation mechanisms. This represents a critical breach of user privacy expectations, as browsing history contains sensitive information about user behavior, financial transactions, and personal research patterns.

WebKit Security Fixes

Denial-of-Service Vulnerabilities

WebKit received five separate patches targeting memory handling and state management issues. CVE-2026-20652, discovered by Nathaniel Oh, addressed a denial-of-service vulnerability triggered by remote attackers. The flaw exploited boundary errors when processing HTML content, causing browser crashes. Similar vulnerabilities (CVE-2026-20635, CVE-2026-20636, CVE-2026-20644) discovered by researchers EntryHi and the TSDubhe team followed identical attack patterns.

Process Crash and Tracking Risks

CVE-2026-20608 enabled maliciously crafted web content to trigger unexpected process crashes through poor state management. Tom Van Goethem identified CVE-2026-20676, which allowed websites to track users through Safari web extensions by exploiting state management weaknesses. Apple addressed both through improved state management protocols.

Affected Systems and Deployment

Safari 26.3 exclusively supports macOS Sonoma and macOS Sequoia. The update does not extend to iOS, iPadOS, or visionOS platforms, which receive security patches through their respective operating system updates. macOS Tahoe 26.3 received a parallel security update on the same date, addressing overlapping vulnerabilities including CVE-2026-20656.

Update Installation Process

macOS users receive Safari 26.3 through System Settings under Software Update. The update installs independently of full system updates, allowing faster deployment of browser security fixes. Apple recommends immediate installation for all macOS Sonoma and Sequoia users to mitigate active exploitation risks.

Context: Recent Safari Security Trends

Safari 26.2, released December 12, 2025, patched two zero-day vulnerabilities (CVE-2025-43529 and CVE-2025-14174) that Apple confirmed were exploited in sophisticated targeted attacks. Google Threat Analysis Group collaborated on discovering these WebKit use-after-free and memory corruption flaws. The rapid succession of critical security updates signals an escalating threat landscape for browser engines in early 2026.

Security Research Recognition

Apple acknowledged contributions from security researchers across multiple organizations. The TSDubhe team and Nan Wang (@eternalsakura13) received recognition for identifying multiple WebKit vulnerabilities. Independent researchers EntryHi, Mickey Jin, and Nathaniel Oh contributed critical vulnerability disclosures. Apple’s security response process includes coordination with researchers like David Wood, Luigino Camastra of Aisle Research, and Vsevolod Kokorin of Solidlab.

Vulnerability Impact Assessment

CVE Identifier Component Impact Severity
CVE-2026-20660  CFNetwork Arbitrary file writing Critical
CVE-2026-20656  Safari History access High
CVE-2026-20652  WebKit Denial-of-service Medium
CVE-2026-20608  WebKit Process crash Medium
CVE-2026-20676  WebKit User tracking Medium
CVE-2026-20644/636/635  WebKit Process crash Medium

Apple’s Security Disclosure Policy

Apple maintains a policy of withholding security vulnerability details until investigations conclude and patches deploy. The company references vulnerabilities by CVE identifiers when available and publishes comprehensive documentation on its security releases page. This approach balances transparency with customer protection by preventing exploitation windows between disclosure and patching.

Frequently Asked Questions (FAQs)

How do I install Safari 26.3 on macOS?

Open System Settings on your Mac, navigate to General > Software Update, and click Update Now when Safari 26.3 appears. The update installs automatically without requiring a system restart.

Does Safari 26.3 work on older macOS versions?

No, Safari 26.3 exclusively supports macOS Sonoma and macOS Sequoia. Users on earlier macOS versions must upgrade their operating system to receive this security update.

What is the most severe vulnerability in Safari 26.3?

CVE-2026-20660 in CFNetwork represents the most critical risk, allowing remote attackers to write arbitrary files to your system without authorization through path handling exploitation.

Should I update Safari immediately?

Yes, Apple recommends immediate installation for all macOS Sonoma and Sequoia users. The vulnerabilities addressed include active privacy and security risks that could compromise browsing data.

Were any Safari 26.3 vulnerabilities exploited before patching?

Apple has not confirmed active exploitation of Safari 26.3 vulnerabilities. However, previous Safari versions (26.2) experienced confirmed zero-day exploitation in targeted attacks.

Does Safari 26.3 include new features?

Safari 26.3 is a security-focused update containing only vulnerability patches. No new features or functionality improvements were included in this release.

How often does Apple release Safari security updates?

Apple releases Safari security updates on an as-needed basis, typically within weeks of discovering critical vulnerabilities. Recent patterns show updates every 4-8 weeks during high-threat periods.

Can I verify which Safari version I’m running?

Open Safari, click Safari in the menu bar, select About Safari, and view your version number. Safari 26.3 displays as “Version 26.3” in this dialog.

Mohammad Kashif
Mohammad Kashif
Senior Technology Analyst and Writer at AdwaitX, specializing in the convergence of Mobile Silicon, Generative AI, and Consumer Hardware. Moving beyond spec sheets, his reviews rigorously test "real-world" metrics analyzing sustained battery efficiency, camera sensor behavior, and long-term software support lifecycles. Kashif’s data-driven approach helps enthusiasts and professionals distinguish between genuine innovation and marketing hype, ensuring they invest in devices that offer lasting value.

Latest articles

Oracle Stopped Moving Data to AI Agents. Here’s Why That Matters for Enterprises.

Oracle AI Database 26ai first shipped in October 2025 as a long-term support release replacing Oracle Database 23ai. No database upgrade or application recertification was required to transition.

Oracle’s Van Program Gives Michigan Seniors Back Their Independence

Oracle and Saline Area Social Service (SASS) launched this program in March 2026 to close that gap directly. What makes this initiative worth examining is how a major tech company chose to invest

Oracle Just Claimed 116,000 More Square Feet in Nashville – Here’s What That Signals for Cloud and AI Hiring

Oracle didn’t rent a floor. It absorbed 116,000 square feet in one of Nashville’s most watched mixed-use developments, and the timing isn’t coincidental. OCI’s growth curve has forced the company’s hand

Kali Linux 2026.1 Brings BackTrack Nostalgia, 8 New Tools, and a Kernel Leap to 6.18

Eight tools added in a single release cycle is not a headline event for most Linux distributions. For Kali, it signals a deliberate acceleration in offensive security coverage. Kali Linux 2026.1, shipped

More like this

Oracle Stopped Moving Data to AI Agents. Here’s Why That Matters for Enterprises.

Oracle AI Database 26ai first shipped in October 2025 as a long-term support release replacing Oracle Database 23ai. No database upgrade or application recertification was required to transition.

Oracle’s Van Program Gives Michigan Seniors Back Their Independence

Oracle and Saline Area Social Service (SASS) launched this program in March 2026 to close that gap directly. What makes this initiative worth examining is how a major tech company chose to invest

Oracle Just Claimed 116,000 More Square Feet in Nashville – Here’s What That Signals for Cloud and AI Hiring

Oracle didn’t rent a floor. It absorbed 116,000 square feet in one of Nashville’s most watched mixed-use developments, and the timing isn’t coincidental. OCI’s growth curve has forced the company’s hand