The vulnerability deals with how WhatsApp processes video calls over Real-time Transport Protocol or RTP.
To upgrade WhatsApp to the latest version, just go to your phone's app store (Google Play on Android or App Store on iOS) and search the instant messaging platform via the search engine or access the "My Apps" sections.
The web version of WhatsApp uses a different method for moving video, so is not vulnerable to this bug.
In the recent statement from the WhatsApp, it said that the company has now fixed this bug in all the devices of Android and iOS.
Rumours about Facebook fuelling ads on Whatsapp started popping up at the end of last month, stating that ads are coming to WhatsApp for iOS, and now same happens for Android, Android Headlines reported. The flaw indicated that the it left WhatsApp users a potential target by hackers during video calls through the app. The company took the issue very serious sensing the gravity of potential and fixed of which details are available on the public domain.
"WhatsApp cares deeply about the security of our users".
WhatsApp told ZDNet that it didn't find any evidence of hackers exploiting this bug to attack other users. Google security researcher Natalie Silvanovich discovered you can rig the RTP data packets in a way to trigger a memory corruption error in the messaging client.
It's thought that left unchecked it could be turned into a weapon was a more damaging payload endangering numerous 1.2bn worldwide users of the app. "We promptly issued a fix to the latest version of WhatsApp to resolve this issue", WhatsApp said.
WhatsApp vulnerability lets Hackers take over your WhatsApp account and phone.