First published: Wed Feb 02 2022(Updated: )
A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | =2.21.23.2 | |
Whatsapp Whatsapp | =2.21.230.6 | |
WhatsApp WhatsApp | =2.2145.0 | |
Whatsapp Whatsapp Business | =2.21.23.2 | |
Whatsapp Whatsapp Business | =2.21.230.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24043 is a vulnerability in WhatsApp for Android, WhatsApp Business for Android, WhatsApp for iOS, WhatsApp Business for iOS, and WhatsApp Desktop that could allow an out-of-bounds heap read if a user sent a malformed RTCP flag.
The severity of CVE-2021-24043 is critical with a CVSS score of 9.1.
WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 are affected by CVE-2021-24043.
To fix CVE-2021-24043, update WhatsApp for Android to version 2.21.23.2 or later, WhatsApp Business for Android to 2.21.23.2 or later, WhatsApp for iOS to 2.21.230.6 or later, WhatsApp Business for iOS to 2.21.230.7 or later, and WhatsApp Desktop to 2.2145.0 or later.
You can find more information about CVE-2021-24043 on the WhatsApp security advisories page.