CVE-2021-24043

9.1 CRITICAL

📋 TL;DR

This vulnerability in WhatsApp's RTCP parsing code allows an attacker to read memory outside the allocated heap buffer by sending a specially crafted RTCP packet during a call. It affects WhatsApp users on Android, iOS, and Desktop platforms. Successful exploitation could leak sensitive information from the application's memory.

💻 Affected Systems

Products:
  • WhatsApp for Android
  • WhatsApp Business for Android
  • WhatsApp for iOS
  • WhatsApp Business for iOS
  • WhatsApp Desktop
Versions: Versions prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, WhatsApp Desktop v2.2145.0
Operating Systems: Android, iOS, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability is triggered during established voice/video calls when RTCP packets are processed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure leading to exposure of sensitive call data, authentication tokens, or other application memory contents that could facilitate further attacks.

🟠

Likely Case

Application crash or instability during calls, potentially disrupting communication.

🟢

If Mitigated

No impact if patched versions are used or if network controls prevent malicious RTCP packets.

🌐 Internet-Facing: HIGH - Attack can be triggered remotely via network packets during calls.
🏢 Internal Only: MEDIUM - Requires attacker to be on the same network or have call access to the target.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires establishing a call with the target and sending malformed RTCP packets. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: WhatsApp for Android v2.21.23.2+, WhatsApp Business for Android v2.21.23.2+, WhatsApp for iOS v2.21.230.6+, WhatsApp Business for iOS 2.21.230.7+, WhatsApp Desktop v2.2145.0+

Vendor Advisory: https://www.whatsapp.com/security/advisories/2021/

Restart Required: Yes

Instructions:

1. Open your device's app store (Google Play Store or Apple App Store). 2. Search for WhatsApp. 3. Update to the latest version. 4. For WhatsApp Desktop, open the application and check for updates in settings or download from whatsapp.com/download.

🔧 Temporary Workarounds

Disable WhatsApp calls

all

Prevent voice/video calls which are required to trigger the vulnerability

Network filtering

all

Block or filter RTCP packets at network perimeter

🧯 If You Can't Patch

  • Restrict WhatsApp usage to trusted networks only
  • Monitor for unusual call behavior or application crashes

🔍 How to Verify

Check if Vulnerable:

Check WhatsApp version in app settings: Settings > Help > App Info. Compare against patched versions listed in affected systems.

Check Version:

Not applicable - check version in app settings interface

Verify Fix Applied:

Confirm version is equal to or higher than patched versions: Android v2.21.23.2+, iOS v2.21.230.6+, Desktop v2.2145.0+

📡 Detection & Monitoring

Log Indicators:

  • Application crashes during calls
  • Unusual memory access errors in system logs

Network Indicators:

  • Malformed RTCP packets during WhatsApp calls
  • Unusual network traffic patterns during calls

SIEM Query:

Not publicly available - monitor for WhatsApp application crashes or network anomalies during voice/video calls

🔗 References

📤 Share & Export