Vulnerability Notice: CVE-2019-3568

Vendor:
Facebook, WhatsApp

Affected Product:
WhatsApp

CVSS SCORE:
9.8 of 10 (Critical)

Risk Index:
9.91 of 10 (Critical)

Description

A critical vulnerability has been identified in the VOIP stack of WhatsApp. This buffer overflow vulnerability allows for remote code execution via a specifically crafted series of Real-Time Control Protocol (RTCP) packets sent to a targeted phone number. This vulnerability is present in multiple versions of WhatsApp across different operating systems.

 

Affected Product(s)

WhatsApp for Android, WhatsApp Business for Android, WhatsApp for iOS, WhatsApp Business for iOS, WhatsApp for Windows Phone, WhatsApp for Tizen

 

Technical Details

The vulnerability in question, CVE-2019-3568, is a buffer overflow issue in WhatsApp’s Voice over IP (VOIP) stack, which had severe implications for the security of millions of users worldwide. This type of vulnerability allows threat actors to execute arbitrary code on a target device by sending a specially crafted series of Real-Time Control Protocol (RTCP) packets to a target phone number.

The affected versions included WhatsApp for Android prior to version 2.19.134, WhatsApp Business for Android prior to version 2.19.44, WhatsApp for iOS prior to version 2.19.51, WhatsApp Business for iOS prior to version 2.19.51, WhatsApp for Windows Phone prior to version 2.18.348, and WhatsApp for Tizen prior to version 2.18.15.

The flaw stems from improper validation of input, leading to violations in the bounds of a memory buffer. Such violations can lead to a heap-based buffer overflow. The significance of a heap-based overflow is that it can corrupt data intended to be stored in adjacent memory, allowing an attacker to overwrite parts of memory and inject malicious operations that the program mistakenly executes. This ability to trick a program into executing unintended instructions opens the door to executing remote code on the affected devices without users’ consent or knowledge. Historically, these types of vulnerabilities have been leveraged by sophisticated threat actors due to their reliability and the elevated level of access they can provide.

In the context of WhatsApp, the delivered payload through these specially crafted RTCP packets penetrates the VOIP call subsystem, taking advantage of the application’s vast permissions to facilitate further exploitation. Based on the exploitation technique, this vulnerability requires minimal user interaction and leverages widely-used VOIP infrastructures. The simplicity and efficacy of the exploit make it a favored method for initial compromise.

Once exploited, adversaries can gain high-level privileges, equivalent to what a regular user with app permissions possesses. The NSO Group, known for developing sophisticated cyber weapons and surveillance tools, was associated with this vulnerability. Their tool, Pegasus, reportedly exploited CVE-2019-3568, reflecting the broader use of this vulnerability vector as part of targeted cyber espionage operations.

Reports suggest that the exploit was used in operations spanning several years, affecting high-profile targets and thereby drawing significant media and governmental scrutiny. The vulnerability has attracted considerable attention within the cybersecurity community, prompting deeper investigations and discussions among researchers and organizations regarding the nature of VOIP security.

The technical mitigation required for this vulnerability involved patching the vulnerable components to enforce strict boundary checks on buffer allocations, thereby preventing unauthorized access. Furthermore, improved logging and inspection were integrated to detect any anomalies indicative of exploitation attempts. With the critical nature of this vulnerability, immediate updates were pushed to mitigate the risk, underscoring the importance of maintaining updated security protocols and software applications across devices.

 

Weakness

This vulnerability is primarily associated with weaknesses identified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-122 (Heap-based Buffer Overflow). Both weaknesses stem from insufficient input validation when handling RTCP packets, allowing a potential exploit through memory corruption.

 

Impact Assessment

If exploited, this vulnerability could allow an attacker to gain unauthorized access to sensitive data or execute arbitrary code on the affected system. Attackers could potentially control the device, intercept communications, and access a wide range of personal or confidential data, leading to severe privacy violations and potential harm to users.

 

Active Exploitation

Evidence suggests that this vulnerability was actively exploited by advanced adversary groups, notably the NSO Group. This group is known for targeting similar vulnerabilities to deploy their spyware, Pegasus. Activity from this group had been observed as they exploited this vulnerability to target specific individuals for surveillance purposes.

 

Ransomware Association

The vulnerability has been linked to spyware, rather than traditional ransomware attacks. However, its exploitation method could theoretically be adapted for ransomware distribution in scenarios where attackers aim to encrypt user data for monetary gain.

 

Mitigation and Resolution

WhatsApp promptly addressed this vulnerability by releasing patches and software updates corresponding to each affected version of their application. Users are strongly advised to update to the latest versions of their WhatsApp applications, ensuring protection against possible exploitation.

 

Recommendations

  • We strongly recommend that all users update their WhatsApp applications to the latest version as soon as possible to protect against this vulnerability.
  • Ensure that automatic updates are enabled on your devices to prevent the inadvertent exposure to renewed threats.
  • Regularly monitor devices for unusual activities or anomalies that could signify malicious exploitation.
  • Be cautious of unsolicited calls or messages on the platform, as they might be the first step in a targeted attack.
  • Consider additional security measures such as mobile security solutions to enhance protection layers.
  • Organizations should provide cybersecurity training for staff to minimize the risk of social engineering attacks that complement technical exploitations.

 

ย References

 

View In Platform

Share This Post On