CVE-2021-24035

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform path traversal attacks when WhatsApp processes ZIP archives, potentially overwriting critical WhatsApp files. It affects WhatsApp for Android and WhatsApp Business for Android users running versions before 2.21.8.13.

💻 Affected Systems

Products:
  • WhatsApp for Android
  • WhatsApp Business for Android
Versions: All versions prior to 2.21.8.13
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open a malicious ZIP file within WhatsApp.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of WhatsApp data and functionality, including message interception, account takeover, or installation of malicious code.

🟠

Likely Case

Corruption of WhatsApp files leading to app crashes, data loss, or denial of service.

🟢

If Mitigated

Limited impact if only non-critical files are overwritten, but still potential for data integrity issues.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user to receive and open a malicious ZIP file via WhatsApp.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.21.8.13 and later

Vendor Advisory: https://www.whatsapp.com/security/advisories/2021/

Restart Required: Yes

Instructions:

1. Open Google Play Store. 2. Search for WhatsApp. 3. Tap Update. 4. Restart WhatsApp after update completes.

🔧 Temporary Workarounds

Disable automatic media download

android

Prevents automatic processing of ZIP files received via WhatsApp.

Open WhatsApp Settings > Storage and Data > Media Auto-Download > Disable all options

🧯 If You Can't Patch

  • Avoid opening ZIP files received via WhatsApp from untrusted sources.
  • Use alternative messaging apps until WhatsApp can be updated.

🔍 How to Verify

Check if Vulnerable:

Check WhatsApp version in Settings > Help > App Info.

Check Version:

Not applicable for Android apps; check via app settings.

Verify Fix Applied:

Confirm WhatsApp version is 2.21.8.13 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file operations in WhatsApp data directory
  • Multiple file overwrite attempts

Network Indicators:

  • ZIP file transfers to WhatsApp users

SIEM Query:

Not typically applicable for mobile app vulnerabilities.

🔗 References

📤 Share & Export