CHKP Check Point Software Technologies Ltd.

Check Point Research Leads to WhatsApp Group Chat Crash Issue Fix

Check Point Research Leads to WhatsApp Group Chat Crash Issue Fix

Research identified flaw that would allow a bad actor to create a malicious group message to crash WhatsApp on users’ devices and leads to fix in latest WhatsApp version

SAN CARLOS, Calif., Dec. 17, 2019 (GLOBE NEWSWIRE) -- Check Point Research, the Threat Intelligence arm of  (NASDAQ: CHKP), a leading provider of cyber security solutions globally, recently helped mitigate a new vulnerability in that could allow a bad actor to deliver a malicious group chat message that would crash the app for all members of the group. To regain use of WhatsApp, users would need to uninstall and reinstall it, then delete the group which contains the message.

To create the malicious message that would impact a WhatsApp group, the bad actor would need to be a member of the target group (WhatsApp allows up to 256 users per group). From there, the bad actor would need to use WhatsApp Web and their web browser’s debugging tool to edit specific message parameters and send the edited text to the group. This edited message would cause a crash loop for group members, denying users access to all WhatsApp functions until they reinstall WhatsApp and delete the group with the malicious message.

Oded Vanunu, Check Point’s Head of Product Vulnerability Research said: “Because WhatsApp is one of the world’s leading communication channels for consumers, businesses and government agencies, the ability to stop people using WhatsApp and delete valuable information from group chats is a powerful weapon for bad actors. All WhatsApp users should update to the latest version of the app to protect themselves against this possible attack.” 

Check Point Research responsibly disclosed its findings to the WhatsApp bug bounty program on August 28th, 2019. WhatsApp acknowledged the findings and developed a fix to resolve the issue, which is available since WhatsApp version number 2.19.58.  Users should manually apply on their devices. “WhatsApp responded quickly and responsibly to deploy the mitigation against exploitation of this vulnerability,” said Oded Vanunu.

“WhatsApp greatly values the work of the technology community to help us maintain strong security for our users globally,” said WhatsApp Software Engineer Ehren Kret. “Thanks to the responsible submission from Check Point to our bug bounty program, we quickly resolved this issue for all WhatsApp apps in mid-September. We have also recently added new controls to prevent people from being added to unwanted groups to avoid communication with untrusted parties all together.”

The Check Point Research team found the vulnerability by inspecting the communications between WhatsApp and WhatsApp Web, the web version of the app which mirrors all messages sent and received from the user’s phone. This enabled researchers to see the parameters used for WhatsApp communications and manipulate them. This new research builds on , which allowed group chat messages to be edited to spread fake news. 

WhatsApp has and more than a billion groups, making it the most popular instant messaging app worldwide. Over 65 billion messages are sent via WhatsApp per day.

Watch the  of how the attack works, and read the full technical details in our research report .

Follow Check Point Research via:

Blog: 

Twitter: 

About Check Point Research

Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT:INVESTOR CONTACT:
Emilie Beneitez LefebvreKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies

EN
17/12/2019

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Check Point Software Unveils Quantum Firewall Software R82.10 to Secur...

Check Point Software Unveils Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise New software release introduces more than 20 capabilities that secure AI transformation, enforce Zero Trust and unify hybrid mesh network protection REDWOOD CITY, Calif., Dec. 04, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments and simplify Zero Trust across hybr...

 PRESS RELEASE

Check Point Software Announces Pricing of Upsized Private Offering of ...

Check Point Software Announces Pricing of Upsized Private Offering of $1.75 Billion of 0.00% Convertible Senior Notes due 2030 TEL AVIV, Israel, Dec. 03, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (Nasdaq: CHKP), a pioneer and global leader of cyber security solutions, today announced the pricing of $1.75 billion aggregate principal amount of 0.00% Convertible Senior Notes due 2030 (the “Notes”) in a private offering (the “Offering”) to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, as amended (the “Securities Act”). The aggrega...

 PRESS RELEASE

Check Point Software Technologies Named a Leader in Gartner Magic Quad...

Check Point Software Technologies Named a Leader in Gartner Magic Quadrant for Email Security We Believe this Reinforces our Excellence in Email Security with AI-Powered Solutions that Combat Advanced Threats REDWOOD CITY, Calif., Dec. 03, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, announces that it has been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security. Excelling across key areas such as core email protection, integrated email security, and outbound security, Check Point delivers AI-powered protect...

 PRESS RELEASE

Check Point Software Announces Proposed Private Offering of $1.5 Billi...

Check Point Software Announces Proposed Private Offering of $1.5 Billion of 0.00% Convertible Senior Notes due 2030 TEL AVIV, Israel, Dec. 02, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced its intention to offer, subject to market conditions and other factors, $1.5 billion aggregate principal amount of 0.00% Convertible Senior Notes due 2030 (the “Notes”) in a private offering (the “Offering”) to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, a...

 PRESS RELEASE

The AI Transformation Has Arrived. Now Comes the Hard Part: Securing I...

The AI Transformation Has Arrived. Now Comes the Hard Part: Securing It Discover how to build resilient, prevention-first AI security — from models and agents to cloud workloads and connectivity. Live on December 4 REDWOOD CITY, Calif., Dec. 02, 2025 (GLOBE NEWSWIRE) -- Artificial intelligence is transforming the enterprise at unprecedented speed. AI now underpins critical workloads, cloud operations, identity systems, code pipelines, and everyday collaboration tools. As these systems expand across hybrid cloud and edge environments, organizations face a new challenge: how to secure AI ...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch