First published: Thu Sep 03 2020(Updated: )
A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | <2.20.17 | |
Whatsapp Whatsapp | <2.20.20 | |
Whatsapp Whatsapp Business | <2.20.7 | |
Whatsapp Whatsapp Business | <2.20.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this WhatsApp vulnerability is CVE-2020-1891.
The severity of CVE-2020-1891 is critical.
WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 are affected by CVE-2020-1891.
The CWE number associated with CVE-2020-1891 is 787.
To fix the CVE-2020-1891 vulnerability, update your WhatsApp application to version 2.20.17 or higher for Android, version 2.20.20 or higher for iPhone, and version 2.20.7 or higher for WhatsApp Business on Android and iPhone.