Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33853: CWE-476 NULL Pointer Dereference in MolotovCherry Android-ImageMagick7

0
Medium
VulnerabilityCVE-2026-33853cvecve-2026-33853cwe-476
Published: Tue Mar 24 2026 (03/24/2026, 05:56:33 UTC)
Source: CVE Database V5
Vendor/Project: MolotovCherry
Product: Android-ImageMagick7

Description

NULL Pointer Dereference vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-10.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 15:05:09 UTC

Technical Analysis

CVE-2026-33853 identifies a NULL Pointer Dereference vulnerability classified under CWE-476 in the MolotovCherry Android-ImageMagick7 library, affecting versions prior to 7.1.2-10. A NULL Pointer Dereference occurs when the software attempts to access or dereference a pointer that has a NULL value, leading to undefined behavior, typically resulting in application crashes or denial of service. This vulnerability is triggered through local access (AV:L) and requires user interaction (UI:R), indicating that an attacker must have some level of access to the device and induce the vulnerable code path, possibly by supplying crafted input or files to the application using this library. The CVSS v3.1 base score is 5.5 (medium severity), reflecting that while the vulnerability does not compromise confidentiality or integrity (C:N, I:N), it impacts availability (A:H) by causing crashes. The attack complexity is low (AC:L), and no privileges are required (PR:N), but the scope remains unchanged (S:U). No known exploits have been reported in the wild, and no patches are currently linked, suggesting that remediation may be pending or that the vulnerability was recently disclosed. The affected product, Android-ImageMagick7, is a variant of the ImageMagick library tailored for Android environments, commonly used for image processing tasks in mobile applications. The vulnerability could be exploited by malicious actors to disrupt services or applications relying on this library, potentially affecting user experience and operational stability.

Potential Impact

The primary impact of CVE-2026-33853 is denial of service through application crashes caused by NULL pointer dereference. This can disrupt services or applications that depend on Android-ImageMagick7 for image processing, leading to potential downtime or degraded user experience. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are unlikely. However, repeated crashes could be exploited to cause persistent service interruptions, affecting availability. For organizations, this could translate into operational disruptions, customer dissatisfaction, and potential reputational damage if critical applications fail. The requirement for local access and user interaction limits remote exploitation, reducing the risk of widespread automated attacks. Nonetheless, environments where Android-ImageMagick7 is embedded in client-facing or internal applications could be targeted by insiders or through social engineering to trigger the vulnerability. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation once exploit code becomes available.

Mitigation Recommendations

1. Monitor for official patches or updates from MolotovCherry and apply them promptly once available to remediate the vulnerability. 2. Implement strict input validation and sanitization in applications using Android-ImageMagick7 to prevent malformed or malicious data from triggering the NULL pointer dereference. 3. Employ application-level error handling to gracefully manage unexpected failures and prevent complete crashes. 4. Restrict local access to devices and applications using this library to trusted users only, minimizing the risk of exploitation. 5. Educate users about the risks of interacting with untrusted files or inputs that could trigger the vulnerability. 6. Use runtime application self-protection (RASP) or monitoring tools to detect abnormal application behavior indicative of exploitation attempts. 7. Consider sandboxing or isolating image processing components to limit the impact of crashes on broader system stability. 8. Maintain regular backups and incident response plans to quickly recover from potential denial of service events.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-03-24T05:55:55.342Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2a3a5f4197a8e3b3eda10

Added to database: 3/24/2026, 2:45:57 PM

Last enriched: 3/24/2026, 3:05:09 PM

Last updated: 5/8/2026, 11:11:59 PM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses