Changeflow GovPing Vulnerability Alerts FreeRDP Vulnerabilities - Remote Code Execution
Priority review Notice Added Final

FreeRDP Vulnerabilities - Remote Code Execution

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 12th, 2026
Detected March 13th, 2026
Email

Summary

CERT-Bund has issued an advisory for multiple vulnerabilities in FreeRDP, a Remote Desktop Protocol implementation. The vulnerabilities have a CVSS base score of 8.8 and allow for remote code execution, denial-of-service, and information disclosure.

What changed

This advisory details multiple critical vulnerabilities (CVSS 8.8) in FreeRDP versions prior to 3.24.0, affecting Linux, UNIX, and Windows systems. Exploitation by a remote, anonymous attacker can lead to arbitrary code execution, denial-of-service, memory corruption, data manipulation, or disclosure of confidential information.

Organizations utilizing FreeRDP should immediately update to a patched version or implement available mitigations. Failure to address these vulnerabilities could expose systems to significant security risks, including complete compromise. The advisory highlights the need for prompt patching to prevent exploitation.

What to do next

  1. Update FreeRDP to version 3.24.0 or later
  2. Implement available security mitigations if immediate update is not possible

Source document (simplified)

[WID-SEC-2026-0725] FreeRDP: Mehrere Schwachstellen CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.9 (hoch) Remoteangriff ja Datum 12.03.2026 Stand 13.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

FreeRDP ist eine freie Implementierung des Remote Desktop Protocol (RDP).

Produkte

12.03.2026
- Open Source FreeRDP <3.24.0

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in FreeRDP ausnutzen, um potenziell beliebigen Code auszuführen, einen Denial-of-Service-Zustand herbeizuführen, Speicherbeschädigungen zu verursachen, Daten zu manipulieren oder vertrauliche Informationen offenzulegen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
Various
Published
March 12th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Technology companies
Geographic scope
INT

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities Remote Desktop Protocol

Get Vulnerability Alerts alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.