\"\"
<\/span><\/figcaption><\/figure>CERT-In advisory<\/a> has warned of multiple vulnerabilities in WhatsApp<\/a> which could help a remote attacker<\/a> to execute an arbitrary code<\/a> on the targeted system.

The
Indian Computer Emergency Response Team<\/a> (CERT-In), which is a nodal agency under the Ministry of Electronics and Information Technology<\/a>, said the vulnerability exists in WhatsApp<\/a> due to integer overflow. “A remote attacker<\/a> could exploit this vulnerability to execute remote code in an established video call,” the cyber security watchdog<\/a> said in an advisory issued on Tuesday.

WhatsApp also confirmed the same in its latest security advisory, saying, “An integer overflow in WhatsApp for Android prior to v2.22.16.12, Business for Android prior to v2.22.16.12, iOS prior to v2.22.16.12, Business for iOS prior to v2.22.16.12 could result in remote code execution in an established video call”.

CERT-In also cited the WhatsApp advisory on integer underflow, and warned that the remote attacker could exploit this vulnerability by sending a specially-crafted video file. To protect themselves from such an attack, WhatsApp users should update the app.

The advisory comes a day after the instant messaging app said it was rolling out call links on WhatsApp.

\"We're rolling out call links on WhatsApp starting this week so you can share a link to start a call with a single tap,\"
Meta<\/a> CEO Mark Zuckerberg<\/a> said in a blog post. \"We're also testing secure encrypted video calling for up to 32 people.\"

WhatsApp currently caps video calls at eight users.<\/body>","next_sibling":[{"msid":94510644,"title":"Former Cisco India president Sameer Garde to take over as CEO of Capillary Technologies","entity_type":"ARTICLE","link":"\/news\/former-cisco-india-president-sameer-garde-to-take-over-as-ceo-of-capillary-technologies\/94510644","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":94511289,"entity_type":"ARTICLE","title":"Cyber security watchdog CERT-In reports vulnerabilities in WhatsApp","synopsis":"The Indian Computer Emergency Response Team (CERT-In), which is a nodal agency under the Ministry of Electronics and Information Technology, said the vulnerability exists in WhatsApp due to integer overflow. \u201cA remote attacker could exploit this vulnerability to execute remote code in an established video call,\u201d the cyber security watchdog said in an advisory issued on Tuesday.","titleseo":"telecomnews\/cyber-security-watchdog-cert-in-reports-vulnerabilities-in-whatsapp","status":"ACTIVE","authors":[],"Alttitle":{"minfo":""},"artag":"ETtech","artdate":"2022-09-28 17:59:58","lastupd":"2022-09-28 18:06:24","breadcrumbTags":["whatsapp","meta","ministry of electronics and information technology","indian computer emergency response team","mark zuckerberg","cert-in advisory","remote attacker","arbitrary code","cyber security watchdog","mvas\/apps"],"secinfo":{"seolocation":"telecomnews\/cyber-security-watchdog-cert-in-reports-vulnerabilities-in-whatsapp"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2022-09-28" data-index="article_1">

网络安全监督、报告在WhatsApp漏洞

印度计算机紧急响应小组(、),这是一个节点机构在电子和信息技术下,说漏洞存在于WhatsApp由于整数溢出。“远程攻击者可以利用此漏洞执行远程代码在一个既定的视频电话,“网络安全监管机构在周二发布的一个顾问说。

  • 更新2022年9月28日下午06:06坚持


、咨询多个漏洞警告WhatsApp这可以帮助远程攻击者执行一个任意代码在目标系统上。

印度的计算机紧急响应小组(、),这是一个节点下电子和信息技术说,漏洞存在WhatsApp由于整数溢出。“一个远程攻击者可以利用这个漏洞执行远程代码在一个既定的视频电话,”网络安全监督机构在周二发布的一个顾问说。

WhatsApp同样证实了在其最新的安全顾问,说,“一个整数溢出在Android WhatsApp v2.22.16.12之前,业务为Android v2.22.16.12之前,iOS v2.22.16.12之前,业务iOS v2.22.16.12之前可能导致远程代码执行在一个既定的视频通话”。

广告
、还提到了整数下溢WhatsApp咨询,并警告说,远程攻击者可以利用此漏洞通过发送一个精雕细琢的视频文件。保护自己免受这样的攻击,WhatsApp用户应该更新应用程序。

咨询的前一天,即时消息应用程序表示,推出WhatsApp电话联系。

“我们推出电话链接WhatsApp本周开始,这样你就可以分享的链接开始和一个水龙头,一个电话”首席执行官马克•扎克伯格在一篇博客文章中说。“我们也测试安全加密视频通话长达32人。”

WhatsApp目前视频通话限制在8个用户。
  • 发布于2022年9月28日下午05:59坚持

加入2 m +行业专业人士的社区

订阅我们的通讯最新见解与分析。乐动扑克

下载ETTelec乐动娱乐招聘om应用

  • 得到实时更新
  • 保存您最喜爱的文章
扫描下载应用程序


\"\"
<\/span><\/figcaption><\/figure>CERT-In advisory<\/a> has warned of multiple vulnerabilities in WhatsApp<\/a> which could help a remote attacker<\/a> to execute an arbitrary code<\/a> on the targeted system.

The
Indian Computer Emergency Response Team<\/a> (CERT-In), which is a nodal agency under the Ministry of Electronics and Information Technology<\/a>, said the vulnerability exists in WhatsApp<\/a> due to integer overflow. “A remote attacker<\/a> could exploit this vulnerability to execute remote code in an established video call,” the cyber security watchdog<\/a> said in an advisory issued on Tuesday.

WhatsApp also confirmed the same in its latest security advisory, saying, “An integer overflow in WhatsApp for Android prior to v2.22.16.12, Business for Android prior to v2.22.16.12, iOS prior to v2.22.16.12, Business for iOS prior to v2.22.16.12 could result in remote code execution in an established video call”.

CERT-In also cited the WhatsApp advisory on integer underflow, and warned that the remote attacker could exploit this vulnerability by sending a specially-crafted video file. To protect themselves from such an attack, WhatsApp users should update the app.

The advisory comes a day after the instant messaging app said it was rolling out call links on WhatsApp.

\"We're rolling out call links on WhatsApp starting this week so you can share a link to start a call with a single tap,\"
Meta<\/a> CEO Mark Zuckerberg<\/a> said in a blog post. \"We're also testing secure encrypted video calling for up to 32 people.\"

WhatsApp currently caps video calls at eight users.<\/body>","next_sibling":[{"msid":94510644,"title":"Former Cisco India president Sameer Garde to take over as CEO of Capillary Technologies","entity_type":"ARTICLE","link":"\/news\/former-cisco-india-president-sameer-garde-to-take-over-as-ceo-of-capillary-technologies\/94510644","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":94511289,"entity_type":"ARTICLE","title":"Cyber security watchdog CERT-In reports vulnerabilities in WhatsApp","synopsis":"The Indian Computer Emergency Response Team (CERT-In), which is a nodal agency under the Ministry of Electronics and Information Technology, said the vulnerability exists in WhatsApp due to integer overflow. \u201cA remote attacker could exploit this vulnerability to execute remote code in an established video call,\u201d the cyber security watchdog said in an advisory issued on Tuesday.","titleseo":"telecomnews\/cyber-security-watchdog-cert-in-reports-vulnerabilities-in-whatsapp","status":"ACTIVE","authors":[],"Alttitle":{"minfo":""},"artag":"ETtech","artdate":"2022-09-28 17:59:58","lastupd":"2022-09-28 18:06:24","breadcrumbTags":["whatsapp","meta","ministry of electronics and information technology","indian computer emergency response team","mark zuckerberg","cert-in advisory","remote attacker","arbitrary code","cyber security watchdog","mvas\/apps"],"secinfo":{"seolocation":"telecomnews\/cyber-security-watchdog-cert-in-reports-vulnerabilities-in-whatsapp"}}" data-news_link="//www.iser-br.com/news/cyber-security-watchdog-cert-in-reports-vulnerabilities-in-whatsapp/94511289">