CVE-2026-24683Use After Free in Freerdp

Severity
8.7HIGHNVD
OSV6.9
EPSS
0.0%
top 94.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 9
Latest updateFeb 16

Description

FreeRDP is a free implementation of the Remote Desktop Protocol. ainput_send_input_event caches channel_callback in a local variable and later uses it without synchronization; a concurrent channel close can free or reinitialize the callback, leading to a use after free. Prior to 3.22.0, This vulnerability is fixed in 3.22.0.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Packages3 packages

NVDfreerdp/freerdp< 3.22.0
debiandebian/freerdp2< freerdp3 3.22.0+dfsg-1 (forky)
debiandebian/freerdp3< freerdp3 3.22.0+dfsg-1 (forky)

Patches

🔴Vulnerability Details

2
OSV
freerdp2, freerdp3 vulnerabilities2026-02-16
OSV
CVE-2026-24683: FreeRDP is a free implementation of the Remote Desktop Protocol2026-02-09

📋Vendor Advisories

3
Ubuntu
FreeRDP vulnerabilities2026-02-16
Red Hat
freerdp: FreeRDP has a heap-use-after-free in ainput_send_input_event2026-02-09
Debian
CVE-2026-24683: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol. ainput_send_inp...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-24683 Impact, Exploitability, and Mitigation Steps | Wiz

💬Community

1
Bugzilla
CVE-2026-24683 freerdp: FreeRDP has a heap-use-after-free in ainput_send_input_event2026-02-09