Loading...
The WhatsApp vulnerability hack (CVE-2019-3568) allows hackers to install WhatsApp spyware on mobile phones. With Lansweeper you can find all mobile devices in your network which are vulnerable to this WhatsApp exploit. Get the free report: https://www.lansweeper.com/vulnerability/whatsapp-zero-day-vulnerability-allows-spyware-installation/

WhatsApp advises to upgrade to the latest version of their app to protect against potential targeted exploits designed to compromise information stored on mobile devices.

Download the report to find all vulnerable mobile devices on your network here: https://www.lansweeper.com/forum/yaf_postsm58581_WhatsApp-Mobile-Zero-Day-Vulnerability.aspx#post58581

Facebook-owned WhatsApp on Monday disclosed the recent fix of a VoIP-related vulnerability that allowed nefarious parties to remotely install spyware on both iOS and Android handsets. 

According to an advisory published by Facebook, a buffer overflow vulnerability in WhatsApp VOIP stack allows remote attackers to execute arbitrary code on target phones by sending a specially crafted series of SRTCP packets.

Apparently, the vulnerability, identified as CVE-2019-3568, can successfully be exploited to install the spyware and steal data from a targeted Android phone or iPhone by merely placing a WhatsApp call, even when the call is not answered.

NSO Group's Pegasus spyware allows attackers to access an incredible amount of data from victims' smartphones remotely, including their text messages, emails, WhatsApp messages, contact details, calls record, location, microphone, and camera—all without the victims' knowledge. 

The vulnerability affects all except the latest version of WhatsApp on iOS and Android, meaning the flaw affected all 1.5 billion people using WhatsApp until yesterday when Facebook finally patched the issue.

Update WhatsApp now to avoid installation of NSO Pegasus spyware.

The issue affects WhatsApp for Android prior to v2.19.134,
WhatsApp Business for Android prior to v2.19.44,
WhatsApp for iOS prior to v2.19.51,
WhatsApp Business for iOS prior to v2.19.51,
WhatsApp for Windows Phone prior to v2.18.348
and WhatsApp for Tizen prior to v2.18.15

Discover Affected WhatsApp Installations via Intune Scanning

Lansweeper hooks directly into Microsoft Intune's API to give you immediate visibility into your mobile environment in no time. Regardless of the operating system: both Android, iOS and Windows Phone devices are supported.

Applications installed on the mobile devices are automatically retrieved when you scan your Intune mobile devices. Lansweeper will also retrieve which version of the application is installed, allowing you to report which versions are currently installed on your corporate mobile devices. 

If you currently have WhatsApp deployed on your mobile devices, it's pretty critical that you update them at the earliest opportunity to ensure that you don't fall prey to this exploit.

Our custom color-coded vulnerability report can tell you in no time which devices have a vulnerable WhatsApp version in place and need to be patched.

If you haven't already, start your free Lansweeper trial and get a report of all affected devices in no time.
Start your free trial today ► https://www.lansweeper.com/download

Lansweeper enables you to manages your entire IT network, saving an incredible amount of time by automating key tasks. It features best in class fully automatic asset scanning and network inventory software, to keep you on top of your IT-environment.  Recommended by sysadmins all over the world, download your Lansweeper free trial today and start managing your IT assets the right way.

Useful Links
Website ► https://www.lansweeper.com/
Knowledgebase ► https://www.lansweeper.com/kb/
Forum ► https://www.lansweeper.com/forum/
Blog ► https://www.lansweeper.com/blog/

Let’s Connect
Facebook ► https://www.facebook.com/lansweeper.n...
Twitter ► https://twitter.com/lansweeper
Linkedin ► https://www.linkedin.com/company/lans...
Contact ► [email protected] 

Comments

Leave a Reply