HomeWhatsappCVE-2018-6349

CVE-2018-6349

CRITICAL
9.8CVSS
Published: 2019-06-14
Updated: 2025-09-03
AI Analysis

Description

When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18.132.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-121CWE-787

Metadata

Primary Vendor
WHATSAPP
Published
6/14/2019
Last Modified
9/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

whatsapp : whatsappwhatsapp : whatsapp_business

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2018-6349 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com