Know All about WhatsApp “Zero-Day Exploit” Vulnerability Scare

Jyoti Sharma | technology | 4 minutes read | Last updated on November 21st, 2022,

Facebook-organised WhatsApp recently solved double WhatsApp Zero day vulnerability in messaging app of Android. It can be oppressed to remotely operate malevolent code on device & even filter out crucial data. Android WhatsApp prior to v2.22.16.2 & WhatsApp for iOS v2.22.15.9 are disturbed by both.

WhatsApp has inaudibly solved twice zero-day vulnerabilities disturbing both Android & iOS edition to allow attackers to directly execute random code.

Both susceptibilities are flagged as perilous with CVE score of 10 out of 10 & caught by Internal security team of WhatsApp.

By simplifying the following susceptibilities, WhatsApp can trigger the device to be scythed when getting video file / during video call.

WhatsApp Zero Day Exploit 1 – CVE – 2022-27492 – Integer Underflow Issue

Hackers can remotely access arbitrary code because of integer underflow (CVE- 2022- 27492) vulnerability, even user connection is required to get advantage of the susceptibility.

Frequently Integer Underflow is used to find signedness issues where the original positive integer become negative as an output of subtraction.

This error is connected to unknown code block of video file manager element. Management with unknown data inputs provided to memory exploitation vulnerability. Moreover, there are some cases of wrong subtraction with unsigned integers therefore, it is not a sign error.

According to Whatsapp consultatory, integer underflow to Android prior in WhatsApp to v2.22.16.2, WhatsApp to iOS v2.22.15.9 can reason remote code performance when getting crafted video file.

Hackers show reformed video to users’ WhatsApp message to get benefits of their weakness.

Hackers have full control of messenger & steal crucial data from the mobile with succeed execution that uses people involvement. The WhatsApp Commercial app is affected by the vulnerabilities.

Basically, WhatsApp has resolved the issue & bugs a safety adviser for two vulnerabilities affecting both Android & iOS edition of the given –

WhatsApp Zero Day Vulnerability 2 – CVE – 2022- 36934 – Interger Overflow Issue

When integer is increased to value that is very large to be saved with the connected representation, the integer overflow, generally referred to as wraparound, happens.

 A WhatsApp flaw that reason integer overflows allow hackers to operate crafted random code in active video calls without user input.

Hacker can opt this RCE flaw, that affects undocumented code of WhatsApp video call operator element, because of a heap supported buffer overflow & seize complete control of WhatsApp messenger.

Bulk overflow situation is buffer overflow in that over writable buffer is located in the bulk area of memory, it indicates the buffer was located with process such as malloc().

 Attackers exploit this remote code execution susceptibility to distribute malware on users’ device to snip crucial file & also access for observation purposes.

Rendering to WhatsApp advisory, integer overflow in WhatsApp for Android prior to v2.22. 16. 12, commercial for Android prior to v2.22.16.22, iOS prior to v2.2216.22, commercial for iOS prior to v2.22.16.12 can output in remote code execution in reputable video call.


  • iOS v2.22.15.9
  • Android prior to v2.22.16.2


  • Business for Android prior to v2.22.16.12
  • Android prior to v2.22.16.12
  • Business for iOS prior to v2.22.16.12
  • iOS prior to v2.22.16.12

There is no technical information available on the risky WhatsApp vulnerabilities so far & exploit is not generally available. As 0 day, approx. underground cost was between $ 5000 & $25000 / per vulnerability.

By WhatsApp orator, there is no evidence that the vulnerabilities have exploited. WhatsApp said – We always look for ways to make the services safety better. We report on potential issues that has solved in agreement with the know industry standards. There is no clue to think that users were obstructed in the condition.

Users are guided to update latest edition of WhatsApp messenger to safe the device from the RCE bugs.

How Unsafe is This?

When you get video file or create a video call, WhatsApp my lead the device to be cooperated by supportive the serious vulnerabilities. With exploiting the vulnerabilities, a virus actor can perform many illicit activities –

  • launch malware
  • Steal sensitive information
  • Look over user’s activities
  • Leak all device

Concerning integer underflow issue in CVE-2022-27492 hackers put a specially generated video file on user’s WhatsApp messenger to get advantage of the vulnerability. An unidentified code block of element video file operator with the issue.

Attackers can use the remote code execution vulnerability in CVE-2022-36934 – integer overflow issue to add malware on user’s device to reave sensitive data & be accessed for following. Unidentified code of video call operator element of WhatsApp is squeezed with the RCE issue.

How to Avoid WhatsApp Hack?

Update to newest edition & enable twice factor authentication (2FA) in WhatsApp & users can simply avoid this from come to pass by updating to recent edition.

The existing way of attacking would be unusable in the condition since the attacker would need safety PIN in addition for the phone number.

 It is important to hire solutions such as VPNs & password manager that can suggestively lower probability of the hack. But education is significant. Several users have accounts with services that add 2FA but do not capable it, number of thousands or perhaps billions.

WhatsApp gently solve double serious zero-day flaws that enabled hackers to remotely perform random code & affected both iOS & Android edition. Facebook, WhatsApp, exclusive messaging service are widely use messaging apps.

 The WhatsApp soundlessly resolved double crucial zero-day vulnerabilities affecting both iOS editions & Android, enable hackers to remotely perform random code. WhatsApp & Facebook’s proprietary messenger are the most famous messaging apps with billions of users on both iPhone & Android.