Critical Alert!!! Whatsapp Bug Could be a Backdoor For Hackers…

Source: https://myicaas.com

Two vulnerabilities in WhatsApp’s messaging software for Android and iOS that might have allowed remote code execution on weak devices have been fixed with security updates. One of these involves WhatsApp’s serious integer overflow vulnerability CVE-2022-36934 (CVSS score: 9.8), which allows malicious code to be executed only by starting a video conversation.
Before version 2.22.16.12, the problem affected both WhatsApp and WhatsApp Business for Android and iOS. An integer underflow bug, which is the opposite category of errors that happen when the outcome of an operation is too small to store the value within the allocated memory space, was also fixed by the Meta-owned messaging platform.

The high-severity flaw, designated CVE-2022-27492 (CVSS score: 7.8), affects versions of WhatsApp for Android and iOS before 2.22.16.2 and 2.22.15.9, respectively. It might be activated by receiving a specially constructed video file. Utilizing integer overflows and underflows to cause unexpected crashes, memory corruption, and code execution is the first step toward triggering undesirable behaviour.
WhatsApp withheld more information about the flaws, but cybersecurity company Malwarebytes said that they are present in two parts known as Video Call Handler and Video File Handler and might allow an attacker to take over the program. When installing malicious software on infected devices, threat actors may find WhatsApp vulnerabilities a lucrative attack vector.

Conclusion

Updating Apps can never be overemphasized. Ensure to update your Apps today.

Total
0
Shares
0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
Prev
Oh no!!! Uber Has Been Hacked…!!!

Oh no!!! Uber Has Been Hacked…!!!

On Thursday afternoon, a hacker launched a cyberattack against Uber by gaining

Next
Multi-factor Authentication!!! Why is it Significant…?

Multi-factor Authentication!!! Why is it Significant…?

Multi-factor authentication (MFA) uses a combination of two or more separate

You May Also Like
0
Would love your thoughts, please comment.x
()
x