⚠ Actively exploited
Added to CISA KEV on 2022-04-19. Federal agencies required to patch by 2022-05-10. Required action: Apply updates per vendor instructions..
CVE-2019-3568 — Heap-based Buffer Overflow in Whatsapp Business FOR Android
Severity
9.8CRITICALNVD
EPSS
45.6%
top 2.38%
CISA KEV
KEV
Added 2022-04-19
Due 2022-05-10
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMay 14
KEV addedApr 19
KEV dueMay 10
Latest updateMay 7
CISA Required Action: Apply updates per vendor instructions.
Description
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages8 packages
🔴Vulnerability Details
3GHSA▶
GHSA-cmw5-mmg8-r4fr: A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of SRTCP packets sent to a target ph↗2022-05-24
CVEList▶
CVE-2019-3568: A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target pho↗2019-05-14