CVE-2021-24026
📋 TL;DR
This vulnerability allows remote code execution via WhatsApp voice calls due to a missing bounds check in the audio decoding pipeline. An attacker could send a malicious audio packet during a call to trigger an out-of-bounds write and potentially execute arbitrary code on the victim's device. All WhatsApp users on affected Android and iOS versions are vulnerable.
💻 Affected Systems
- WhatsApp for Android
- WhatsApp Business for Android
- WhatsApp for iOS
- WhatsApp Business for iOS
📦 What is this software?
Whatsapp by Whatsapp
Whatsapp by Whatsapp
⚠️ Risk & Real-World Impact
Worst Case
Remote attacker gains full control of victim's device through WhatsApp call, leading to data theft, surveillance, or further network compromise.
Likely Case
Remote code execution allowing installation of malware, data exfiltration, or device takeover.
If Mitigated
Attack prevented by updated WhatsApp version; no impact with proper patching.
🎯 Exploit Status
Exploitation requires initiating or receiving a WhatsApp call; no authentication needed beyond standard call functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Android v2.21.3+, iOS v2.21.32+
Vendor Advisory: https://www.whatsapp.com/security/advisories/2021/
Restart Required: No
Instructions:
1. Open Google Play Store or Apple App Store. 2. Search for WhatsApp. 3. Tap Update. 4. Ensure version is Android v2.21.3+ or iOS v2.21.32+.
🔧 Temporary Workarounds
Disable WhatsApp Calls
allPrevent exploitation by disabling voice call functionality.
🧯 If You Can't Patch
- Block WhatsApp voice calls at network perimeter using DPI or application control.
- Use mobile device management to restrict WhatsApp installation on corporate devices.
🔍 How to Verify
Check if Vulnerable:
Check WhatsApp version in app settings: Settings > Help > App Info.
Check Version:
Not applicable - check via app interface.
Verify Fix Applied:
Confirm WhatsApp version is Android v2.21.3+ or iOS v2.21.32+.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from WhatsApp, abnormal memory access patterns in system logs.
Network Indicators:
- Suspicious audio packet patterns in WhatsApp call traffic, unexpected outbound connections post-call.
SIEM Query:
Not applicable - mobile endpoint detection required.