Impact
Samsung Open Source Escargot suffers from an improper check or handling of exceptional conditions that enables attackers to manipulate input data. This flaw is a classic example of CWE‑703 and can lead to unintended changes in the data processed by Escargot, potentially compromising the integrity of applications that rely on the JavaScript engine. No evidence indicates that the vulnerability results in denial of service or code execution, so the primary concern is data manipulation.
Affected Systems
The flaw affects the Samsung Open Source Escargot JavaScript engine, specifically the code base identified by commit 590345cc6258317c5da850d846ce6baaf2afc2d3. Systems running this version or earlier are potentially vulnerable. No other vendors or product versions are listed.
Risk and Exploitability
The CVSS score for this issue is 5.5, indicating a moderate severity. The EPSS score is not available, so the likelihood of exploitation in the wild is unknown. The vulnerability is not listed in the CISA KEV catalog, suggesting no active exploitation yet. The likely attack vector requires an attacker to supply crafted input to the Escargot engine, such as via a vulnerable application that parses data with Escargot. Because the flaw involves improper exception handling, the attacker must be able to trigger an exception during data processing.
OpenCVE Enrichment