CVE-2026-33855: CWE-190 Integer Overflow or Wraparound in MolotovCherry Android-ImageMagick7
CVE-2026-33855 is an integer overflow or wraparound vulnerability (CWE-190) in the MolotovCherry Android-ImageMagick7 product, affecting versions before 7. 1. 2-11. The flaw can be triggered by a local attacker with low complexity and no privileges but requires user interaction. Exploitation leads to a denial of service (availability impact) without compromising confidentiality or integrity. No known exploits are currently in the wild. The vulnerability has a medium severity with a CVSS score of 5. 5. Organizations using this image processing library on Android devices should prioritize updating to version 7. 1.
AI Analysis
Technical Summary
CVE-2026-33855 identifies an integer overflow or wraparound vulnerability in the MolotovCherry Android-ImageMagick7 library, a component used for image processing on Android platforms. The vulnerability arises when the software improperly handles integer values, causing them to overflow or wrap around during calculations. This can lead to unexpected behavior, specifically a denial of service (DoS) condition where the application or system component crashes or becomes unresponsive. The flaw affects all versions prior to 7.1.2-11. The attack vector is local, meaning an attacker must have access to the device, but no privileges are required. However, user interaction is necessary to trigger the vulnerability, such as opening a crafted image file. The CVSS 3.1 base score is 5.5, reflecting medium severity, with the vector string indicating low attack complexity, no privileges required, user interaction needed, and impact limited to availability. No exploits have been reported in the wild, and no patches are currently linked, suggesting the fix may be forthcoming or in development. The vulnerability is classified under CWE-190, which covers integer overflow or wraparound issues that can cause software to behave incorrectly or crash. This vulnerability is particularly relevant for applications or systems that rely on Android-ImageMagick7 for image processing tasks, as exploitation can disrupt service availability.
Potential Impact
The primary impact of CVE-2026-33855 is a denial of service condition affecting availability. For organizations, this can translate into application crashes or system instability when processing specially crafted images, potentially disrupting business operations that depend on image manipulation or rendering. While confidentiality and integrity are not directly affected, the loss of availability can hinder productivity, especially in sectors such as media, telecommunications, and mobile services where image processing is critical. The local attack vector and requirement for user interaction limit the scope of exploitation, reducing the likelihood of widespread automated attacks. However, targeted attacks against high-value devices or users could still cause significant disruption. Enterprises with large Android device fleets or those embedding Android-ImageMagick7 in their applications should be aware of potential service interruptions. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details are widely known.
Mitigation Recommendations
To mitigate CVE-2026-33855, organizations should: 1) Monitor for and apply updates to Android-ImageMagick7, specifically upgrading to version 7.1.2-11 or later once released. 2) Implement strict input validation and sanitization for image files processed by the application to reduce the risk of triggering the overflow. 3) Restrict local access to devices and enforce least privilege principles to limit potential attackers' ability to interact with vulnerable components. 4) Educate users about the risks of opening untrusted or unsolicited image files to reduce the likelihood of user interaction-based exploitation. 5) Employ application sandboxing and runtime protections on Android devices to contain crashes and prevent system-wide impact. 6) Monitor logs and system behavior for signs of crashes or abnormal application terminations related to image processing. 7) Consider deploying host-based intrusion detection systems that can detect anomalous behavior indicative of exploitation attempts. These steps go beyond generic patching advice by emphasizing proactive input validation, user awareness, and layered defense strategies to reduce exploitation risk before patches are applied.
Affected Countries
United States, India, China, Brazil, Germany, Japan, South Korea, Russia, United Kingdom, France, Canada, Australia
CVE-2026-33855: CWE-190 Integer Overflow or Wraparound in MolotovCherry Android-ImageMagick7
Description
CVE-2026-33855 is an integer overflow or wraparound vulnerability (CWE-190) in the MolotovCherry Android-ImageMagick7 product, affecting versions before 7. 1. 2-11. The flaw can be triggered by a local attacker with low complexity and no privileges but requires user interaction. Exploitation leads to a denial of service (availability impact) without compromising confidentiality or integrity. No known exploits are currently in the wild. The vulnerability has a medium severity with a CVSS score of 5. 5. Organizations using this image processing library on Android devices should prioritize updating to version 7. 1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33855 identifies an integer overflow or wraparound vulnerability in the MolotovCherry Android-ImageMagick7 library, a component used for image processing on Android platforms. The vulnerability arises when the software improperly handles integer values, causing them to overflow or wrap around during calculations. This can lead to unexpected behavior, specifically a denial of service (DoS) condition where the application or system component crashes or becomes unresponsive. The flaw affects all versions prior to 7.1.2-11. The attack vector is local, meaning an attacker must have access to the device, but no privileges are required. However, user interaction is necessary to trigger the vulnerability, such as opening a crafted image file. The CVSS 3.1 base score is 5.5, reflecting medium severity, with the vector string indicating low attack complexity, no privileges required, user interaction needed, and impact limited to availability. No exploits have been reported in the wild, and no patches are currently linked, suggesting the fix may be forthcoming or in development. The vulnerability is classified under CWE-190, which covers integer overflow or wraparound issues that can cause software to behave incorrectly or crash. This vulnerability is particularly relevant for applications or systems that rely on Android-ImageMagick7 for image processing tasks, as exploitation can disrupt service availability.
Potential Impact
The primary impact of CVE-2026-33855 is a denial of service condition affecting availability. For organizations, this can translate into application crashes or system instability when processing specially crafted images, potentially disrupting business operations that depend on image manipulation or rendering. While confidentiality and integrity are not directly affected, the loss of availability can hinder productivity, especially in sectors such as media, telecommunications, and mobile services where image processing is critical. The local attack vector and requirement for user interaction limit the scope of exploitation, reducing the likelihood of widespread automated attacks. However, targeted attacks against high-value devices or users could still cause significant disruption. Enterprises with large Android device fleets or those embedding Android-ImageMagick7 in their applications should be aware of potential service interruptions. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details are widely known.
Mitigation Recommendations
To mitigate CVE-2026-33855, organizations should: 1) Monitor for and apply updates to Android-ImageMagick7, specifically upgrading to version 7.1.2-11 or later once released. 2) Implement strict input validation and sanitization for image files processed by the application to reduce the risk of triggering the overflow. 3) Restrict local access to devices and enforce least privilege principles to limit potential attackers' ability to interact with vulnerable components. 4) Educate users about the risks of opening untrusted or unsolicited image files to reduce the likelihood of user interaction-based exploitation. 5) Employ application sandboxing and runtime protections on Android devices to contain crashes and prevent system-wide impact. 6) Monitor logs and system behavior for signs of crashes or abnormal application terminations related to image processing. 7) Consider deploying host-based intrusion detection systems that can detect anomalous behavior indicative of exploitation attempts. These steps go beyond generic patching advice by emphasizing proactive input validation, user awareness, and layered defense strategies to reduce exploitation risk before patches are applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GovTech CSG
- Date Reserved
- 2026-03-24T05:55:55.342Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c2d885f4197a8e3b5f9740
Added to database: 3/24/2026, 6:31:33 PM
Last enriched: 3/24/2026, 6:48:45 PM
Last updated: 3/24/2026, 7:36:33 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.