CVE-2020-1909 vulnerability in WhatsApp Products
Published on November 3, 2020
A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold.
Weakness Type
What is a Dangling pointer Vulnerability?
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.
CVE-2020-1909 has been classified to as a Dangling pointer vulnerability or weakness.
Products Associated with CVE-2020-1909
stack.watch emails you whenever new vulnerabilities are published in WhatsApp or Whatsapp Business. Just hit a watch button to start following.
Affected Versions
Facebook WhatsApp Business for iOS:- Version 2.20.111 is affected.
- Version unspecified and below 2.20.111 is affected.
- Version 2.20.81 and below unspecified is affected.
- Version 2.20.111 is affected.
- Version unspecified and below 2.20.111 is affected.
- Version 2.20.81 and below unspecified is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.