A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp fo
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348…
| Vendor | Product | Versions |
|---|---|---|
| WhatsApp for Android | 2.19.134, unspecified | |
| WhatsApp Business for Android | 2.19.44, unspecified | |
| WhatsApp for iOS | 2.19.51, unspecified | |
| WhatsApp Business for iOS | 2.19.51, unspecified | |
| WhatsApp for Windows Phone | 2.18.348, unspecified | |
| WhatsApp for Tizen | 2.18.15, unspecified |
Yes — actively exploited. Added to the CISA KEV catalog on 2022-04-19. Ransomware use: Unknown.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.