Plattform
linux
Komponente
freerdp
Behoben in
3.24.1
CVE-2026-29776 describes an integer underflow vulnerability discovered in the FreeRDP Core Library. This flaw, present in versions of FreeRDP up to 3.24.0, can potentially lead to a denial-of-service condition. The vulnerability is fixed in version 3.24.0, and users are strongly advised to upgrade.
An attacker could exploit this integer underflow to crash the FreeRDP client or server, resulting in a denial-of-service. Successful exploitation requires the attacker to send a specially crafted RDP request to the vulnerable FreeRDP instance. While the CVSS score is LOW, a denial-of-service can disrupt remote access and potentially impact critical services relying on RDP connectivity. The impact is particularly relevant in environments where RDP is used for remote administration or access to sensitive data.
CVE-2026-29776 was publicly disclosed on 2026-03-13. As of this date, there are no publicly available proof-of-concept exploits. The vulnerability is not currently listed on the CISA KEV catalog. The LOW CVSS score suggests a relatively low probability of exploitation in the wild, but proactive patching is still recommended.
Systems utilizing FreeRDP for remote access, particularly those running older versions (≤ 3.24.0), are at risk. This includes organizations relying on FreeRDP for thin client deployments, remote administration of servers, or providing remote desktop services to employees. Shared hosting environments where FreeRDP is deployed could also be affected.
• linux / server:
journalctl -f -u freerdp_server | grep -i 'error' # Monitor FreeRDP server logs for errors
ps aux | grep freerdp # Check running FreeRDP processesdisclosure
Exploit-Status
EPSS
0.04% (11% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-29776 is to upgrade FreeRDP to version 3.24.0 or later. If immediate upgrading is not feasible, consider implementing temporary workarounds such as restricting network access to the FreeRDP server, limiting RDP connections, and employing a Web Application Firewall (WAF) to filter malicious RDP traffic. Monitoring RDP logs for unusual activity or connection attempts can also help detect potential exploitation attempts. After upgrading, verify the fix by attempting to connect with a known malicious RDP payload (if available) and confirming that the server remains stable.
Aktualisieren Sie FreeRDP auf Version 3.24.0 oder höher. Diese Version enthält die Korrektur für den Integer Underflow in der Funktion update_read_cache_bitmap_order.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-29776 is a denial-of-service vulnerability in FreeRDP Core Library affecting versions up to 3.24.0, caused by an integer underflow in bitmap handling. It can lead to FreeRDP crashing.
You are affected if you are using FreeRDP version 3.24.0 or earlier. Check your FreeRDP version and upgrade if necessary.
Upgrade FreeRDP to version 3.24.0 or later. If immediate upgrade is not possible, consider temporary workarounds like restricting RDP access.
There is currently no evidence of active exploitation or public proof-of-concept code for CVE-2026-29776.
Refer to the FreeRDP project's security advisories for the latest information: [https://freedom-liftoff.org/](https://freedom-liftoff.org/)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.