CVE-2026-33952Reachable Assertion in Freerdp

Severity
6.0MEDIUMNVD
EPSS
0.1%
top 83.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 30

Description

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, an unvalidated auth_length field read from the network triggers a WINPR_ASSERT() failure in rts_read_auth_verifier_no_checks(), causing any FreeRDP client connecting through a malicious RDP Gateway to crash with SIGABRT. This is a pre-authentication denial of service affecting all FreeRDP clients using RPC-over-HTTP gateway transport. The assertion is active in default release builds (WITH_VERBOSE_WINPR_ASS

CVSS vector

CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5freerdp/freerdp< 3.24.2
NVDfreerdp/freerdp< 3.24.2

Patches

🔴Vulnerability Details

2
CVEList
FreeRDP: DoS via WINPR_ASSERT in rts_read_auth_verifier_no_checks2026-03-30
OSV
CVE-2026-33952: FreeRDP is a free implementation of the Remote Desktop Protocol2026-03-30

📋Vendor Advisories

2
Red Hat
FreeRDP: FreeRDP: Denial of Service via unvalidated authentication length field2026-03-30
Debian
CVE-2026-33952: freerdp2 - FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to versio...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-33952 Impact, Exploitability, and Mitigation Steps | Wiz