HomeWhatsappCVE-2018-20655

CVE-2018-20655

CRITICAL
9.8CVSS
Published: 2019-06-14
Updated: 2025-09-03
AI Analysis

Description

When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-121CWE-787

Metadata

Primary Vendor
WHATSAPP
Published
6/14/2019
Last Modified
9/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

whatsapp : whatsappwhatsapp : whatsapp_business

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2018-20655 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com