Cybercriminals can attack iOS WhatsApp users via Apple's Siri, CERT-In says

The team spotted a glitch in the Screen Lock feature in both apps. An attacker could exploit this vulnerability by using Apple's Siri feature to communicate even after the phone is locked.

November 11, 2020 03:51 pm | Updated 04:05 pm IST

Updating the app's software to the latest one could help mitigate the vulnerabilities, MeitY recommended.

Updating the app's software to the latest one could help mitigate the vulnerabilities, MeitY recommended.

(Subscribe to our Today's Cache newsletter for a quick snapshot of top 5 tech stories. Click here to subscribe for free.)

Cybercriminals can exploit WhatsApp users through Apple's voice command feature Siri due to glitches in the app.

Multiple vulnerabilities in WhatsApp and WhatsApp Business for iOS could allow a remote attacker to bypass security restrictions or execute arbitrary code on the user's system, the Indian Computer Emergency Response Team (CERT-In) said in a statement.

The CERT-In falls under the Ministry of Electronics and Information Technology (MeitY).

The team spotted a glitch in the Screen Lock feature in both apps. An attacker could exploit this vulnerability by using Apple's Siri feature to communicate even after the phone is locked.

Also read | Hackers can exploit Zoom users by noticing shoulder movements, report says

The team also noted a vulnerability in the app's logging library. This could enable a cybercriminal to send specially crafted animated sticker to the target user while placing WhatsApp video call on hold. This could result in phone memory corruption, denial-of-service conditions, and execution of remote code.

Updating the app's software to the latest one could help mitigate the vulnerabilities, CERT-In recommended.

Earlier in September, the nodal agency governing cyberattacks had issued warnings against security glitches in WhatsApp in multiple devices including Android, iPhone, and desktop versions.

These vulnerabilities could allow attackers to execute remote code, and perform cross-site scripting which involves inputting a malicious script into a user's web browser, the team said.

0 / 0
Sign in to unlock member-only benefits!
  • Access 10 free stories every month
  • Save stories to read later
  • Access to comment on every story
  • Sign-up/manage your newsletter subscriptions with a single click
  • Get notified by email for early access to discounts & offers on our products
Sign in

Comments

Comments have to be in English, and in full sentences. They cannot be abusive or personal. Please abide by our community guidelines for posting your comments.

We have migrated to a new commenting platform. If you are already a registered user of The Hindu and logged in, you may continue to engage with our articles. If you do not have an account please register and login to post comments. Users can access their older comments by logging into their accounts on Vuukle.