Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-24042: Heap-based Buffer Overflow (CWE-122) in Facebook WhatsApp Desktop

0
Critical
VulnerabilityCVE-2021-24042cvecve-2021-24042cwe-122
Published: Tue Jan 04 2022 (01/04/2022, 18:55:08 UTC)
Source: CVE
Vendor/Project: Facebook
Product: WhatsApp Desktop

Description

The calling logic for WhatsApp for Android prior to v2.21.23, WhatsApp Business for Android prior to v2.21.23, WhatsApp for iOS prior to v2.21.230, WhatsApp Business for iOS prior to v2.21.230, WhatsApp for KaiOS prior to v2.2143, WhatsApp Desktop prior to v2.2146 could have allowed an out-of-bounds write if a user makes a 1:1 call to a malicious actor.

AI-Powered Analysis

AILast updated: 07/08/2025, 06:28:04 UTC

Technical Analysis

CVE-2021-24042 is a critical heap-based buffer overflow vulnerability (CWE-122) affecting multiple versions of WhatsApp across platforms, including WhatsApp Desktop prior to version 2.2146. The flaw exists in the calling logic of WhatsApp's 1:1 call feature, where an out-of-bounds write can occur if a user receives a call from a malicious actor. This vulnerability allows an attacker to overwrite memory outside the intended buffer boundaries, potentially leading to arbitrary code execution, complete compromise of the affected application, and system-level impacts. The vulnerability has a CVSS v3.1 score of 9.8, indicating a critical severity with network attack vector, no required privileges or user interaction, and impacts on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the ease of exploitation combined with the widespread use of WhatsApp Desktop and related mobile versions makes this a significant threat. The vulnerability affects WhatsApp for Android, iOS, KaiOS, and Desktop, emphasizing the broad attack surface. Successful exploitation could allow remote attackers to execute arbitrary code, steal sensitive communications, or disrupt service availability without user interaction or authentication, making it highly dangerous.

Potential Impact

For European organizations, the impact of CVE-2021-24042 could be severe. WhatsApp is widely used for both personal and professional communications across Europe, including by employees, executives, and third parties. Exploitation could lead to unauthorized access to confidential business communications, intellectual property theft, and potential lateral movement within corporate networks if WhatsApp Desktop is used on corporate endpoints. The critical nature of the vulnerability means attackers could gain full control over affected devices, leading to data breaches, espionage, or ransomware deployment. The disruption of communication channels could also affect operational continuity. Given the cross-platform nature of the vulnerability, organizations with Bring Your Own Device (BYOD) policies or remote workforces are particularly at risk. Furthermore, sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, could face compliance violations and reputational damage if exploited.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy: 1) Immediate patching: Ensure all WhatsApp Desktop clients and mobile versions are updated to the latest patched versions (Desktop >= 2.2146, Android >= 2.21.23, iOS >= 2.21.230, KaiOS >= 2.2143). 2) Network controls: Restrict or monitor incoming WhatsApp call traffic at network boundaries where feasible, especially from unknown or untrusted contacts. 3) Endpoint protection: Deploy advanced endpoint detection and response (EDR) solutions capable of detecting anomalous behavior indicative of exploitation attempts. 4) User awareness: Educate users about the risks of accepting calls from unknown contacts and encourage cautious use of communication apps. 5) Application control: Where possible, limit the installation or use of WhatsApp Desktop on critical corporate endpoints or isolate it within secure environments. 6) Incident response readiness: Prepare for potential exploitation by establishing monitoring for suspicious WhatsApp-related activity and having response plans in place. These steps go beyond generic advice by focusing on both patch management and operational controls tailored to the threat vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
facebook
Date Reserved
2021-01-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682f725b0acd01a2492647a7

Added to database: 5/22/2025, 6:52:11 PM

Last enriched: 7/8/2025, 6:28:04 AM

Last updated: 2/7/2026, 5:04:29 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats