First published: Thu Sep 03 2020(Updated: )
A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | <2.20.30 | |
Whatsapp Whatsapp | <2.20.35 | |
Whatsapp Whatsapp Business | <2.20.20 | |
Whatsapp Whatsapp Business | <2.20.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1894 is a vulnerability in WhatsApp for Android and WhatsApp Business for Android that could allow arbitrary code execution when playing a specially crafted push to talk message.
The severity of CVE-2020-1894 is high with a severity value of 8.8.
WhatsApp for Android prior to v2.20.35 and WhatsApp Business for Android prior to v2.20.20 are affected by CVE-2020-1894.
The CVE-2020-1894 vulnerability can be exploited by playing a specially crafted push to talk message on WhatsApp for Android and WhatsApp Business for Android.
Yes, users should update to WhatsApp for Android version 2.20.35 and WhatsApp Business for Android version 2.20.20 to fix the CVE-2020-1894 vulnerability.