WhatsApp: This critical bug can affect iOS, Android devices – All you need to know

WhatsApp Update: Meta-owned WhatsApp has disclosed a critical bug that could affect older installations on multiple devices that have not been updated to the latest software versions. The vulnerability could allow an attacker to exploit a code bug known as integer overflow.

“An integer overflow in WhatsApp for Android before v2.22.16.12, Business for Android before v2.22.16.12, iOS before v2.22.16.12, Business for iOS before v2.22.16.12 v2.22.16.12 could lead to remote code execution in an established video call,” WhatsApp said in an update.

According to the IANS report, in remote code execution, a hacker can remotely execute commands on someone else’s computing device. Remote code execution (RCE) usually occurs due to malware downloaded by the host and can occur regardless of the device’s geographic location.

The newly disclosed vulnerability has been named CVE-2022-36934, with a severity score of 9.8 out of 10 on the CVE scale. WhatsApp also revealed details of another bug that could have led to remote code execution when receiving a crafted video file in the app. Both these vulnerabilities have been patched in the latest versions of WhatsApp.

Additionally, WhatsApp recently announced that it was rolling out Call Links to make it easier to start and join a call with a single tap. The company also started testing secure and encrypted group video calls for up to 32 people on WhatsApp.

In related news, the Meta-owned messaging app plans to bring a new feature that will allow users to add a caption to any document they share via WhatsApp. The instant messaging platform will add captioning feature to document sharing option.

According to WabetaInfo, the future updated version of WhatsApp will soon have a feature to share documents with a caption. Although WhatsApp currently allows document sharing, it does not provide an option to write a caption on the document

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *