An Indian cyber security agency has warned WhatsApp users against a "vulnerability" that can compromise their individual account without seeking permissions even as the popular social messaging app said users have not been impacted.
The Computer Emergency Response Team-India (CERT-In) has issued an advisory in this context calling the severity of the threat, being spread by an MP4 file, as "high."
The advisory comes in the backdrop of recent developments where WhatsApp had informed the Indian government in September that over hundred Indian users were targeted by the Israeli spyware -- Pegasus.
"A vulnerability has been reported in WhatsApp which could be exploited by a remote attacker to execute arbitrary code on the target system," the latest advisory said.
The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian internet domain.
A WhatsApp spokesperson said the company is constantly working to improve the security of their service.
"We make public, reports on potential issues we have fixed consistent with industry best practices. In this instance there is no reason to believe users were impacted," the spokesperson said.
The Indian cyber security agency's advisory suggested "upgrading" to the latest version of WhatsApp to combat or tide over the problem.
Describing the malicious action of the vulnerability in the popular social messaging app (application), it said, "A stack-based buffer overflow vulnerability exists in WhatsApp due to improper parsing of elementary stream metadata of an MP4 file. A remote attacker could exploit this vulnerability by sending a specially crafted MP4 file to the target system."
It added that this could trigger a buffer overflow condition leading to execution of arbitrary code by the attacker.
"The exploitation does not require any form of authentication from the victim's end and executes on downloading of malicious crafted mp4 file on victim's system," it said.
Successful exploitation of this vulnerability, it said, could allow the remote attacker to cause remote code execution (RCE) or denial of service (DoS) condition, which could lead to further compromise of the system.
It stated half-a-dozen WhatsApp software have been "affected" by the current vulnerability.
They have been identified as WhatsApp for Android prior to 2.19.274, WhatsApp for iOS prior to 2.19.100, WhatsApp Enterprise Client prior to 2.25.3, WhatsApp for Windows Phone prior to 2.18.368, WhatsApp Business for Android prior to 2.19.104 and WhatsApp Business for iOS prior to 2.19.100.
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
)