Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33855: CWE-190 Integer Overflow or Wraparound in MolotovCherry Android-ImageMagick7

0
Medium
VulnerabilityCVE-2026-33855cvecve-2026-33855cwe-190
Published: Tue Mar 24 2026 (03/24/2026, 05:58:53 UTC)
Source: CVE Database V5
Vendor/Project: MolotovCherry
Product: Android-ImageMagick7

Description

CVE-2026-33855 is an integer overflow or wraparound vulnerability (CWE-190) in the MolotovCherry Android-ImageMagick7 product, affecting versions before 7. 1. 2-11. The flaw can be triggered by a local attacker with low complexity and no privileges but requires user interaction. Exploitation leads to a denial of service (availability impact) without compromising confidentiality or integrity. No known exploits are currently in the wild. The vulnerability has a medium severity with a CVSS score of 5. 5. Organizations using this image processing library on Android devices should prioritize updating to version 7. 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 18:48:45 UTC

Technical Analysis

CVE-2026-33855 identifies an integer overflow or wraparound vulnerability in the MolotovCherry Android-ImageMagick7 library, a component used for image processing on Android platforms. The vulnerability arises when the software improperly handles integer values, causing them to overflow or wrap around during calculations. This can lead to unexpected behavior, specifically a denial of service (DoS) condition where the application or system component crashes or becomes unresponsive. The flaw affects all versions prior to 7.1.2-11. The attack vector is local, meaning an attacker must have access to the device, but no privileges are required. However, user interaction is necessary to trigger the vulnerability, such as opening a crafted image file. The CVSS 3.1 base score is 5.5, reflecting medium severity, with the vector string indicating low attack complexity, no privileges required, user interaction needed, and impact limited to availability. No exploits have been reported in the wild, and no patches are currently linked, suggesting the fix may be forthcoming or in development. The vulnerability is classified under CWE-190, which covers integer overflow or wraparound issues that can cause software to behave incorrectly or crash. This vulnerability is particularly relevant for applications or systems that rely on Android-ImageMagick7 for image processing tasks, as exploitation can disrupt service availability.

Potential Impact

The primary impact of CVE-2026-33855 is a denial of service condition affecting availability. For organizations, this can translate into application crashes or system instability when processing specially crafted images, potentially disrupting business operations that depend on image manipulation or rendering. While confidentiality and integrity are not directly affected, the loss of availability can hinder productivity, especially in sectors such as media, telecommunications, and mobile services where image processing is critical. The local attack vector and requirement for user interaction limit the scope of exploitation, reducing the likelihood of widespread automated attacks. However, targeted attacks against high-value devices or users could still cause significant disruption. Enterprises with large Android device fleets or those embedding Android-ImageMagick7 in their applications should be aware of potential service interruptions. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once the vulnerability details are widely known.

Mitigation Recommendations

To mitigate CVE-2026-33855, organizations should: 1) Monitor for and apply updates to Android-ImageMagick7, specifically upgrading to version 7.1.2-11 or later once released. 2) Implement strict input validation and sanitization for image files processed by the application to reduce the risk of triggering the overflow. 3) Restrict local access to devices and enforce least privilege principles to limit potential attackers' ability to interact with vulnerable components. 4) Educate users about the risks of opening untrusted or unsolicited image files to reduce the likelihood of user interaction-based exploitation. 5) Employ application sandboxing and runtime protections on Android devices to contain crashes and prevent system-wide impact. 6) Monitor logs and system behavior for signs of crashes or abnormal application terminations related to image processing. 7) Consider deploying host-based intrusion detection systems that can detect anomalous behavior indicative of exploitation attempts. These steps go beyond generic patching advice by emphasizing proactive input validation, user awareness, and layered defense strategies to reduce exploitation risk before patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-03-24T05:55:55.342Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2d885f4197a8e3b5f9740

Added to database: 3/24/2026, 6:31:33 PM

Last enriched: 3/24/2026, 6:48:45 PM

Last updated: 3/24/2026, 7:36:33 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses