SINGAPORE: WhatsApp users should update to the latest version of the popular messaging app after two "remote code execution" vulnerabilities were reported, ...
This vulnerability affects WhatsApp for Android prior to version 2.22.16.2, and WhatsApp for iOS version 2.22.15.9. This vulnerability affects WhatsApp and WhatsApp Business for iOS and Android prior to version 2.22.16.12. The first vulnerability affects the WhatsApp Video Call Handler component, allowing an attacker to exploit the vulnerability during a video call to a targeted user, and take complete control of their WhatsApp application, SingCERT said.
There are two security flaws and they could give hackers complete control over the app. Read more at straitstimes.com.
- WhatsApp for Android prior to version 2.22.16.2 - WhatsApp Business for iOS and Android prior to version 2.22.16.12 - WhatsApp for iOS and Android prior to version 2.22.16.12
SINGAPORE — WhatsApp has released an update to address security flaws that could allow attackers to gain complete control of a targeted user's mobile ...
- WhatsApp for Android before version 2.22.16.2 - WhatsApp Business for iOS and Android before version 2.22.16.12 - WhatsApp for iOS and Android before version 2.22.16.12
The Singapore Computer Emergency Response Team (SingCert) has urged WhatsApp users to immediately update their applications. The advisory issued on Sep. 28 said ...
- WhatsApp for Android prior to v2.22.16.2 - WhatsApp Business for iOS and Android prior to v2.22.16.1 - WhatsApp for iOS and Android prior to v2.22.16.12 - WhatsApp for iOS v2.22.15.9 An attacker can also send a specially-crafted video file to targeted users and convince them to play it and then take complete control of their WhatsApp application. An attacker can exploit one of the vulnerabilities during a video call with a targeted user to take complete control of their WhatsApp application.
SINGAPORE (The Straits Times/Asia News Network): WhatsApp users in Singapore have been urged to download the latest version of the application to fix two ...
- WhatsApp for Android prior to version 2.22.16.2 - WhatsApp Business for iOS and Android prior to version 2.22.16.12 - WhatsApp for iOS and Android prior to version 2.22.16.12
The Singapore Computer Emergency Response Team (SingCert) has issued an alert urging WhatsApp users to update the app immediately.
Additionally, they can enable automatic updates if available to ensure the download. A hacker can use it to send video files to their victim, taking control of the app thereafter. Old versions of the app contain two significant flaws. Users can find the latest updates on their respective app stores. - WhatsApp Business for iOS and Android prior to v2.22.16.12 - WhatsApp for iOS and Android prior to v2.22.16.12
CVE-2022-36934 - An integer overflow vulnerability that affects the WhatsApp Video Call Handler component, allowing an attacker to exploit the vulnerability ...
Users are also encouraged to enable automatic updates (if available) in iOS App Store and Android Play Store to ensure their applications are updated promptly. - WhatsApp Business for iOS and Android prior to v2.22.16.12 - WhatsApp for Android prior to v2.22.16.2 - WhatsApp for iOS and Android prior to v2.22.16.12 Users of affected WhatsApp versions are advised to update to the latest versions immediately. - WhatsApp for iOS v2.22.15.9
Secure messaging app WhatsApp has issued an important fix for a security vulnerability that could allow an attacker to plant malware while you're on a video ...
Meanwhile, CVE-2022-27492 affects an unspecified code block of the component Video File Handler. Security firm Malwarebytes describes CVE-2022-36934 in a “The manipulation with an unknown input leads to a memory corruption vulnerability,” Malwarebytes explained, adding that to exploit this vulnerability, attackers “would have to drop a crafted video file on the user’s WhatsApp messenger and convince the user to play it.” [blog](https://www.malwarebytes.com/blog/news/2022/09/critical-whatsapp-vulnerabilities-patched-check-youve-updated): “This RCE bug affects a piece of code in the WhatsApp component Video Call Handler, which allows an attacker to manipulate the bug to trigger a heap-based buffer overflow and take complete control of WhatsApp Messenger.” [CVE-2022-36934](https://nvd.nist.gov/vuln/detail/CVE-2022-36934), the flaw is an [integer overflow](https://en.wikipedia.org/wiki/Integer_overflow) issue in WhatsApp for Android and iOS that could result in remote code execution in a video call, WhatsApp said in [security advisory](https://www.whatsapp.com/security/advisories/2022/). [CVE-2022-27492](https://nvd.nist.gov/vuln/detail/CVE-2022-27492)—an integer underflow flaw in WhatsApp for Android prior to v2.22.16.2 and WhatsApp for iOS v2.22.15.9 that could cause remote code execution when the victim receives a crafted video file.
State-owned cyber security agency Indian Computer Emergency Response Team (CERT-In) has warned WhatsApp users to update their messenger app as soon as ...
[Dailymotion ](https://www.dailymotion.com/DeccanHerald) [Facebook ](https://www.facebook.com/deccanherald/) [Twitter ](https://twitter.com/DeccanHerald) WhatsApp has mentioned the same on its security advisories bulletin. Even WhatsApp Business accounts should also upgrade to the latest update. Once inside, bad actors can remotely execute an illegal operation or take control of the targeted phone.