Security Advisory

Critical vulnerability alerts and security research

WhatsApp iOS Remote Code Execution (RCE)

Critical SEVERITY

Critical zero-click vulnerability in WhatsApp for iOS allowing remote code execution through malicious video calls.

Key Details

CVE ID CVE-2026-XXXX
Affected WhatsApp iOS ≤ 2.24.5
Attack Vector Video Call (Zero-Click)
Impact Full device compromise
Patch Status Pending

Technical Analysis

**Vulnerability Summary:**
Critical memory corruption vulnerability in WhatsApp's video call handling on iOS.

**Root Cause:**
- Integer overflow in RTCP packet parsing
- Heap buffer overflow in video codec initialization
- Lack of proper bounds checking on incoming stream data

**Attack Flow:**
1. Attacker initiates WhatsApp video call
2. Malformed RTCP packet sent during handshake
3. Integer overflow triggers heap allocation of small buffer
4. Video frame data writes beyond buffer bounds
5. Controlled memory corruption achieves code execution

**Exploit Reliability:** ~85% success rate
**Detection:** Difficult - appears as normal call failure
        

Proof of Concept


```bash
# Exploit requires:
# - Target phone number
# - WhatsApp online status
# - 2-3 seconds connection time

# PoC Structure (Educational Only)
python3 whatsapp_rce_poc.py --target +1234567890 --payload shellcode.bin

# Expected behavior:
# [+] Connecting to WhatsApp servers...
# [+] Initiating video call...
# [+] Sending malformed RTCP...
# [+] Triggering overflow...
# [+] Payload executed!
```

Mitigation & Protection

**Immediate Actions:**
1. Update WhatsApp to latest version immediately
2. Disable video calls from unknown contacts
3. Enable "Silence Unknown Callers" in iOS settings
4. Monitor for unusual battery drain during calls

**Detection:**
- Unexpected WhatsApp crashes during calls
- Device heating during "failed" video calls
- Suspicious network connections to *.whatsapp.net
        

⚠️ This vulnerability is being actively exploited in the wild. Patch immediately.

Back to Home