WhatsApp iOS Remote Code Execution (RCE)
Critical SEVERITY
Critical zero-click vulnerability in WhatsApp for iOS allowing remote code execution through malicious video calls.
Key Details
CVE ID
CVE-2026-XXXX
Affected
WhatsApp iOS ≤ 2.24.5
Attack Vector
Video Call (Zero-Click)
Impact
Full device compromise
Patch Status
Pending
Technical Analysis
**Vulnerability Summary:**
Critical memory corruption vulnerability in WhatsApp's video call handling on iOS.
**Root Cause:**
- Integer overflow in RTCP packet parsing
- Heap buffer overflow in video codec initialization
- Lack of proper bounds checking on incoming stream data
**Attack Flow:**
1. Attacker initiates WhatsApp video call
2. Malformed RTCP packet sent during handshake
3. Integer overflow triggers heap allocation of small buffer
4. Video frame data writes beyond buffer bounds
5. Controlled memory corruption achieves code execution
**Exploit Reliability:** ~85% success rate
**Detection:** Difficult - appears as normal call failure
Proof of Concept
```bash
# Exploit requires:
# - Target phone number
# - WhatsApp online status
# - 2-3 seconds connection time
# PoC Structure (Educational Only)
python3 whatsapp_rce_poc.py --target +1234567890 --payload shellcode.bin
# Expected behavior:
# [+] Connecting to WhatsApp servers...
# [+] Initiating video call...
# [+] Sending malformed RTCP...
# [+] Triggering overflow...
# [+] Payload executed!
```
Mitigation & Protection
**Immediate Actions:**
1. Update WhatsApp to latest version immediately
2. Disable video calls from unknown contacts
3. Enable "Silence Unknown Callers" in iOS settings
4. Monitor for unusual battery drain during calls
**Detection:**
- Unexpected WhatsApp crashes during calls
- Device heating during "failed" video calls
- Suspicious network connections to *.whatsapp.net
⚠️ This vulnerability is being actively exploited in the wild. Patch immediately.