Close Menu
Innovation Village | Technology, Product Reviews, Business
    Facebook X (Twitter) Instagram
    Friday, June 20
    • About us
      • Authors
    • Contact us
    • Privacy policy
    • Terms of use
    • Advertise
    • Newsletter
    • Post a Job
    • Partners
    Facebook X (Twitter) LinkedIn YouTube WhatsApp
    Innovation Village | Technology, Product Reviews, Business
    • Home
    • Innovation
      • Products
      • Technology
      • Internet of Things
    • Business
      • Agritech
      • Fintech
      • Healthtech
      • Investments
        • Cryptocurrency
      • People
      • Startups
      • Women In Tech
    • Media
      • Entertainment
      • Gaming
    • Reviews
      • Gadgets
      • Apps
      • How To
    • Giveaways
    • Jobs
    Innovation Village | Technology, Product Reviews, Business
    You are at:Home»Android»WhatsApp has fixed a critical vulnerability in an older version of the app
    WhatsApp
    WhatsApp

    WhatsApp has fixed a critical vulnerability in an older version of the app

    0
    By Smart Megwai on September 27, 2022 Android, Cybersecurity, iOS, Whatsapp

    WhatsApp, yesterday disclosed a critical bug that it claims may have affected older installations on various devices that have not been updated to the latest software version.

    The Meta-owned app published details of the “critical” vulnerability in the September update of the WhatsApp security advisory page, which was released on September 23rd.

    These versions of WhatsApp are affected by at least one of the vulnerabilities:

    • WhatsApp for Android prior to v2.22.16.12

    • WhatsApp Business for Android prior to v2.22.16.12

    • WhatsApp for iOS prior to v2.22.16.12

    • WhatsApp Business for iOS prior to v2.22.16.12

    The vulnerability could allow an attacker to exploit a code error known as an integer overflow.

    “An integer overflow in WhatsApp for Android prior to v2.22.16.12, Business for Android prior to v2.22.16.12, iOS prior to v2.22.16.12, Business for iOS prior to v2.22.16.12 could result in remote code execution in an established video call,” WhatsApp noted in the update.

    In remote code execution, a hacker can remotely execute commands on someone else’s computing device.

    Remote code executions (RCEs) usually occur due to malicious malware downloaded by the host and can happen regardless of the device’s geographic location.

    The recently disclosed vulnerability has been called CVE-2022-36934, with a severity score of 9.8 out of 10 on the CVE scale.

    WhatsApp also revealed details of another bug that could have caused remote code execution when receiving a crafted video file.

    Both of these vulnerabilities have been patched in the latest versions of WhatsApp.

    On Monday, the company’s CEO announced that it would introduce calling links to make it easier to start and join conversations with a single tap.

    CEO Mark Zuckerberg also mentioned WhatsApp has started testing secure encrypted group video calls for up to 32 people on WhatsApp.

    Related

    Android OS iOS Whatsapp
    Share. Facebook Twitter Pinterest LinkedIn Email
    Smart Megwai
    • Facebook
    • X (Twitter)
    • Instagram
    • LinkedIn

    Smart is a Tech Writer. His passion for educating people is what drives him to provide practical tech solutions which helps solve everyday tech-related issues.

    Related Posts

    Best Educational Apps for Kids in 2025: Learning That’s Actually Worth Your Data

    iPhone 16e vs. Infinix GT 20 Pro: ₦1.2M or ₦500k—Which One Wins on Value?

    Samsung vs. Tecno: Which Phone Brand Actually Gives You More for ₦200k in Nigeria?

    Leave A Reply Cancel Reply

    You must be logged in to post a comment.

    Copyright ©, 2013-2024 Innovation-Village.com. All Rights Reserved

    Type above and press Enter to search. Press Esc to cancel.