Impact
The vulnerability is a null pointer dereference that allows pointer manipulation in the Samsung Open Source Walrus project. This flaw can corrupt memory and potentially lead to application crashes or unintended code execution. The weakness corresponds to CWE‑476, indicating improper handling of null pointers. The impact is restricted to the process that uses Walrus, but if an attacker can trigger the fault, the entire application could be compromised.
Affected Systems
Walrus is part of Samsung's open‑source offering. The defective code is present in commit f339b8ee4ea701772e8ae640b3d1b12ac02b1ae9. Any builds derived from that commit are affected. Current releases that have applied the fix are not impacted.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate risk. The EPSS score is not available, so the likelihood of exploitation is unclear. The vulnerability is not listed in the CISA KEV catalog. The attack vector is not explicitly documented; based on the description, the vulnerability is triggered when a null pointer is dereferenced, which suggests a local code execution need or an external input that leads to the fault. Without additional privileges or authentication bypass, exploitation would likely result in a denial of service, though the potential for code execution exists if the misuse of the pointer is exploited.
OpenCVE Enrichment