CVE-2026-47312
Buffer Manipulation in Samsung Open Source Escargot
Publication date: 2026-05-19
Last updated on: 2026-05-19
Assigner: Samsung TV & Appliance
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| samsung | escargot | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-763 | The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a release of an invalid pointer or reference in Samsung Open Source Escargot, which allows buffer manipulation.
How can this vulnerability impact me? :
The vulnerability can impact you by causing a buffer manipulation issue, which may lead to availability problems as indicated by the CVSS score (Availability impact: High).
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update Samsung Escargot to the latest version that includes the fix for the crash issues.
Refer to the official Samsung Escargot GitHub repository pull request #1565 which addresses the crash issues related to this vulnerability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.