Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33856: CWE-401 Missing Release of Memory after Effective Lifetime in MolotovCherry Android-ImageMagick7

0
High
VulnerabilityCVE-2026-33856cvecve-2026-33856cwe-401
Published: Tue Mar 24 2026 (03/24/2026, 05:59:58 UTC)
Source: CVE Database V5
Vendor/Project: MolotovCherry
Product: Android-ImageMagick7

Description

CVE-2026-33856 is a high-severity vulnerability in MolotovCherry's Android-ImageMagick7 prior to version 7. 1. 2-11. It is classified as a CWE-401: Missing Release of Memory after Effective Lifetime, meaning the software fails to free allocated memory, causing a memory leak. The vulnerability has a CVSS 3. 1 base score of 7. 5, indicating it is remotely exploitable without authentication or user interaction and impacts availability by potentially causing denial of service through resource exhaustion. No known exploits are currently reported in the wild. The issue affects Android devices using the vulnerable ImageMagick7 library, which is commonly used for image processing tasks. Organizations relying on this library in Android environments may face service disruptions or degraded performance.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 00:04:27 UTC

Technical Analysis

CVE-2026-33856 identifies a memory management vulnerability in the MolotovCherry Android-ImageMagick7 library versions before 7.1.2-11. The flaw is categorized under CWE-401, which involves missing release of memory after its effective lifetime, commonly known as a memory leak. This occurs when the software allocates memory for processing images but fails to free it appropriately after use, leading to gradual consumption of system memory. Over time, this can degrade system performance or cause application crashes due to exhaustion of available memory resources. The vulnerability is remotely exploitable without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on availability (A:H), meaning attackers can cause denial of service conditions by triggering the memory leak repeatedly. Although no exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant risk. Android-ImageMagick7 is a widely used image processing library in Android applications, making the scope of affected systems broad. The absence of patches at the time of reporting necessitates prompt attention from developers and organizations using this library to prevent potential exploitation. The vulnerability does not affect confidentiality or integrity directly but can disrupt services relying on image processing capabilities.

Potential Impact

The primary impact of CVE-2026-33856 is on the availability of systems using the vulnerable Android-ImageMagick7 library. Memory leaks can lead to progressive resource exhaustion, causing applications or entire devices to slow down, crash, or become unresponsive. For organizations, this can translate into denial of service conditions in applications that rely on image processing, potentially affecting user experience, operational continuity, and service reliability. In environments where image processing is critical—such as mobile apps for social media, e-commerce, or enterprise workflows—this vulnerability could disrupt business operations. Additionally, attackers could exploit this flaw to conduct denial of service attacks remotely without needing credentials or user interaction, increasing the risk profile. While no direct data breach or code execution is indicated, the disruption caused could have cascading effects on dependent services and infrastructure. The widespread use of Android devices globally means the potential impact is extensive, especially in sectors heavily reliant on mobile applications.

Mitigation Recommendations

To mitigate CVE-2026-33856, organizations should prioritize updating the Android-ImageMagick7 library to version 7.1.2-11 or later once the patch is released by MolotovCherry. Until an official patch is available, developers should consider implementing temporary workarounds such as limiting the frequency and volume of image processing requests to reduce memory consumption. Application-level monitoring should be enhanced to detect abnormal memory usage patterns indicative of exploitation attempts. Employing runtime memory analysis tools can help identify leaks during development and testing phases. Additionally, sandboxing the image processing component can limit the impact of potential crashes or resource exhaustion. Security teams should also review application dependencies to ensure no other components are vulnerable to similar memory management issues. Finally, maintaining an incident response plan for denial of service scenarios will help minimize operational disruption if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-03-24T05:55:55.342Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c32654f4197a8e3b9def75

Added to database: 3/25/2026, 12:03:32 AM

Last enriched: 3/25/2026, 12:04:27 AM

Last updated: 3/25/2026, 1:05:25 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses