WhatsApp and Vulnerabilities

    WhatsApp is a Facebook owned messaging system popular for their endtoend encryption and groups that are capable of including up to 256 members. A shared communication tool is critical to have while coordinating amongst friends and participants of collaborative efforts. When one of those collaborators has malicious intentions it doesnt take much effort to sow discord in the group, it takes even less to disrupt the group when the communication platform has bugs to exploit.



    Check Point discussed a series of chat manipulations they were capable of per-forming on the service by decrypting the communication between the mobile and web versions of the WhatsApp app. They presented three manipulations at the BlackHat 2019 conference and WhatsApp has had some of those vulnerabilities patched. Their continued research into the app has revealed a critical flaw in how WhatsApp responds to unexpected inputs in the phone number parameter.

    The Check Point team was able to modify the contents of the phone number parameter to something beyond the allowable 520 numerical character range. A malicious actor can modify it into any nonnumerical character, then send a message to a group in which the malicious actor is already participating to crash the Application for all the participants of the group. The app would then enter a crash loop being unable to be reopened until the user deletes the offending message and group.


    The group is thus forever lost and all historic data within those communications are lost. Check Points head of product vulnerability research also points out that a malicious actor could send out a timed phishing message directly or shortly after the malicious message crashes the victims WhatsApp application. An unwary user might be more susceptible to a timely sms or email message requesting personal or sensitive information in hopes of repairing their app.


    WhatsApp Engineer, Ehren Kret, claims in a statement to WIRED that the issue has been patched since midSeptember and that there are additional controls to maintain the security of group chats.

Sources:

  https://research.checkpoint.com/2019/breakingappwhatsappcrashdatalossbug/

 
https://www.wired.com/story/whatsappgroupchatcrashbug/


https://thehackernews.com/2019/12/whatsappgroupcrash.html