FreeRDP Vulnerabilities Allow Remote Code Execution, DoS
Summary
CERT-Bund has issued a security advisory regarding multiple vulnerabilities in FreeRDP, a Remote Desktop Protocol implementation. The vulnerabilities could allow remote attackers to execute arbitrary code, cause denial-of-service, or disclose sensitive information. The advisory affects Fedora Linux and Open Source FreeRDP versions prior to 3.24.2.
What changed
CERT-Bund has released security advisory WID-SEC-2026-0880 detailing multiple vulnerabilities in FreeRDP, an open-source implementation of the Remote Desktop Protocol. These vulnerabilities, with a CVSS Base Score of 7.5 (High) and Temporal Score of 6.5 (Medium), can be exploited by remote, anonymous attackers. Successful exploitation could lead to arbitrary code execution, denial-of-service, data manipulation, disclosure of confidential information, or other unspecified attacks.
This advisory impacts Fedora Linux and Open Source FreeRDP versions prior to 3.24.2, affecting systems running on UNIX and Windows operating systems. Organizations utilizing FreeRDP should prioritize updating to a patched version or implementing available mitigations to protect against potential exploitation. The advisory highlights the need for prompt vulnerability management for remote access software.
What to do next
- Update FreeRDP to version 3.24.2 or later
- Implement available mitigations if immediate update is not possible
- Review system logs for signs of exploitation
Source document (simplified)
[WID-SEC-2026-0880] FreeRDP: Mehrere Schwachstellen CVSS Base Score 7.5 (hoch) CVSS Temporal Score 6.5 (mittel) Remoteangriff ja Datum 25.03.2026 Stand 26.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
FreeRDP ist eine freie Implementierung des Remote Desktop Protocol (RDP).
Produkte
25.03.2026
- Fedora Linux
- Open Source FreeRDP <3.24.2
Angriff
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in FreeRDP ausnutzen, um potenziell beliebigen Code auszuführen, einen Denial-of-Service-Zustand herbeizuführen, Daten zu manipulieren, vertrauliche Informationen offenzulegen oder andere, nicht näher spezifizierte Angriffe durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.