New WhatsApp 0-Day Bug Let Hackers Execute a Code & Take Full App Control Remotely
by - Thursday, January 1, 1970 at 12:00 AM
WhatsApp silently fixed two critical zero-day vulnerabilities that affect both Android & iOS versions allowing attackers to execute an arbitrary code remotely.

Facebook-owned messenger WhatsApp is one of the Top-ranked Messenger apps with more than Billion users around the world in both Android and iPhone.

Both vulnerabilities are marked under “critical” severity with a CVE Score of 10/10 and found by the WhatsApp internal security Team.


WhatsApp 0-Day Bugs

CVE-2022-36934 - An integer overflow in WhatsApp for Android prior to v2.22.16.12,
Business for Android prior to v2.22.16.12, iOS prior to v2.22.16.12,
Business for iOS prior to v2.22.16.12 could result in remote code execution in an established video call.


CVE-2022-36934 –  Integer Overflow Bug

An Integer overflow bug that affects WhatsApp allows attackers to execute the specially crafted arbitrary code during an established Video call without any sort of user interaction.

An integer overflow also know as “wraparound” occurs when an integer value is incremented to a value that is too large to store in the associated representation.

This RCE bug affects an unknown code of the WhatsApp component Video Call Handler, which allows an attacker to manipulate the bug to trigger a heap-based buffer overflow and take complete control of WhatsApp Messenger.

“A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().”

Hackers can take advantage of this remote code execution vulnerability to deploy the malware on the user’s device to steal sensitive files and also used for surveillance purposes.

According to WhatsApp Advisory “An integer overflow in WhatsApp for Android prior to v2.22.16.12, Business for Android prior to v2.22.16.12, iOS prior to v2.22.16.12, Business for iOS prior to v2.22.16.12 could result in remote code execution in an established video call.”

CVE-2022-27492 – Integer Underflow Bug

An Integer Underflow vulnerability (CVE-2022-27492) allows attackers to execute the arbitrary code remotely, and user interaction is required to exploit this bug successfully.

“Integer underflow” is sometimes used to identify signedness errors in which an originally positive number becomes negative as a result of subtraction. However, there are cases of bad subtraction in which unsigned integers are involved, so it’s not always a signedness issue.

This issue affects an unknown code block of the component Video File Handler. The manipulation with an unknown input leads to a memory corruption vulnerability.

According to the WhatsApp advisory “An integer underflow in WhatsApp for Android prior to v2.22.16.2, WhatsApp for iOS v2.22.15.9 could have caused remote code execution when receiving a crafted video file.”

To exploit this vulnerability, attackers drop a crafted video file on the user’s WhatsApp messenger. The successful execution with the help of user interaction let hackers gain complete access to the messenger and steal sensitive data from your mobile device.

Whatsapp fixed the bugs and released a security advisory for 2 vulnerabilities that affects both Android & iOS version of Following:

  • CVE-2022-36934
  • Android prior to v2.22.16.12
  • Business for Android prior to v2.22.16.12
  • iOS prior to v2.22.16.12
  • Business for iOS prior to v2.22.16.12
  • CVE-2022-27492
  • Android prior to v2.22.16.2
  • iOS v2.22.15.9


So far, no technical details are available for these critical WhatsApp Vulnerabilities, and an exploit is not available at this moment. As 0-day the estimated underground price was around $5k-$25k per vulnerability.
Sometimes we live like in the hell 


tg : t.me/insideheartz
wanna donate ? USDT : TTe5XaiadrL8kaPtB3tsyKonkqNjfwJw3S


Reply
niceeeeeee
Reply
Whatsapp lane is the best
Reply
What a coincidence, recently Indonesian Independent News agency (Narasi) suffer with cyber attack attacking all social media account and most of their Whataspp account being takeover.
Go away for for long time for healing
See your again
\"We Breach for better future\"

Reply
Zero days is always a good news
Reply
(September 27, 2022, 12:12 PM)Lavi Wrote: What a coincidence, recently Indonesian Independent News agency (Narasi) suffer with cyber attack attacking all social media account and most of their Whataspp account being takeover.


sound interesting
Sometimes we live like in the hell 


tg : t.me/insideheartz
wanna donate ? USDT : TTe5XaiadrL8kaPtB3tsyKonkqNjfwJw3S


Reply
I wonder if we will ever see public POC, I guess it wouldn't be worth that much cause whatsapp forces you to update after a while
Reply
(September 27, 2022, 07:47 PM)sockpuppet3 Wrote: I wonder if we will ever see public POC, I guess it wouldn't be worth that much cause whatsapp forces you to update after a while


4days ago , Whatsapp force update their apps
Sometimes we live like in the hell 


tg : t.me/insideheartz
wanna donate ? USDT : TTe5XaiadrL8kaPtB3tsyKonkqNjfwJw3S


Reply
thanks for the info <3
Reply
Yeah Yeah
Reply


 Users viewing this thread: New WhatsApp 0-Day Bug Let Hackers Execute a Code & Take Full App Control Remotely: No users currently viewing.