Platform
linux
Component
freerdp
Fixed in
3.24.1
CVE-2026-29776 describes an integer underflow vulnerability discovered in the FreeRDP Core Library. This flaw, present in versions of FreeRDP up to 3.24.0, can potentially lead to a denial-of-service condition. The vulnerability is fixed in version 3.24.0, and users are strongly advised to upgrade.
The integer underflow vulnerability resides within the updatereadcachebitmaporder function of the FreeRDP Core Library. An attacker could exploit this by crafting malicious Remote Desktop Protocol (RDP) traffic, specifically targeting bitmap handling. Successful exploitation could cause FreeRDP to crash or become unresponsive, resulting in a denial-of-service. While the CVSS score is LOW, a denial-of-service can disrupt remote access and potentially impact critical services relying on RDP connectivity. The impact is primarily focused on the FreeRDP client or server process, with limited potential for broader system compromise.
CVE-2026-29776 was publicly disclosed on 2026-03-13. There is no indication of active exploitation campaigns or public proof-of-concept code available at this time. The vulnerability is not currently listed on the CISA KEV catalog. Given the LOW CVSS score and lack of public exploits, the probability of exploitation is considered low.
Exploit Status
EPSS
0.04% (11% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-29776 is to upgrade FreeRDP to version 3.24.0 or later. If immediate upgrading is not feasible, consider implementing temporary workarounds such as restricting RDP access to trusted networks or employing network segmentation to limit the blast radius of a potential attack. While a WAF or proxy might not directly prevent this integer underflow, it can help mitigate the impact by rate-limiting RDP connections and filtering potentially malicious traffic patterns. After upgrading, confirm the fix by attempting to connect to the FreeRDP server with a standard RDP client and verifying that no crashes or unexpected behavior occurs.
Update FreeRDP to version 3.24.0 or higher. This version contains the fix for the integer overflow in the update_read_cache_bitmap_order function.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-29776 is a denial-of-service vulnerability in FreeRDP Core Library affecting versions up to 3.24.0, caused by an integer underflow in bitmap handling. It can lead to FreeRDP crashing.
You are affected if you are using FreeRDP version 3.24.0 or earlier. Check your FreeRDP version and upgrade if necessary.
Upgrade FreeRDP to version 3.24.0 or later. If immediate upgrade is not possible, consider temporary workarounds like restricting RDP access.
There is currently no evidence of active exploitation or public proof-of-concept code for CVE-2026-29776.
Refer to the FreeRDP project's security advisories for the latest information: [https://freedom-liftoff.org/](https://freedom-liftoff.org/)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.