Vulnerabilities

Downloading a video file though WhatsApp could allow your smartphone to be hacked

Again, WhatsApp has become the target of malicious hacker attacks. According to web application security specialists, a critical vulnerability has been revealed in the instant messaging service that, if exploited, would allow a threat actor to hack a smartphone using only a malicious mp4 file to generate denial of service conditions (DoS) or even remote code execution (RCE).

The vulnerability, tracked as CVE-201911931, is present in the video encoder output, which is converted to video file metadata; it is mentioned that the flaw exists due to incorrect analysis of elementary metadata from mp4 files, which allowing to triggering the error.

It is not yet clear whether the targeted user
should download and play the video or if the vulnerability is exploited just by
receiving the file, although it is a fact that the flaw affects the versions of
WhatsApp
and WhatsApp for Business for iOS, Android and even for Windows Phone.

The bug report, presented by Facebook, mentions
that: “It is possible to trigger a stack-based buffer overflow by sending
a specially crafted mp4 file to an application user”. Web application
security specialists mention that the latest versions of WhatsApp already
include the fix of this flaw, plus they remind users that the vulnerability was
rated as critical, so it is necessary that they update their app to the latest
version available.

Does this flaw really
affect WhatsApp users?

There are multiple reasons why this vulnerability could be exploited in the wild. The main reason is that many users rely to the automatic download of the multimedia content received through the app. According to web application security specialists, the main recommendation to avoid the exploitation of this flaw is to disable automatic download of photos and videos in the account settings.

Although there are no known cases of exploitation,
Facebook decided to release the report so that WhatsApp users were aware of its
existence and updated as soon as possible. Users are invited to enter their
corresponding app store and install the latest version of the app.

In case your app is already updated but you
want to run some tests, web application security specialists from the International
Institute of Cyber Security (IICS) recommend downloading an older version from external
app stores or third-party websites; in this case, make sure these platforms are
secure.

Privacy scandals have been a constant on WhatsApp over the past year. A few weeks ago, it was revealed that the advanced spyware known as Pegasus had been used to violate the privacy of thousands of journalists and activists around the world, with WhatsApp being the main path of infection of this malware, allegedly developed by the Israeli security firm NSO Group.

To Top

Pin It on Pinterest

Share This