Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, FastGlyph parsing trusts `cbData`/remaining length and never validates against the minimum size implied by `cx/cy`. A malicious server can trigger a client‑side global buffer overflow, causing a crash (DoS). Version 3.21.0 contains a patch for the issue.
Published: 2026-01-19
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (client crash)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the parsing of FastGlyph data on the FreeRDP client. The code uses the cbData length without confirming that the minimum size implied by the glyph dimensions is satisfied. An attacker controlling a remote RDP server can send a malformed glyph packet that overflows a client‑side heap buffer. The result is a client crash, which is a denial‑of‑service condition. The weakness is a classic heap buffer overflow (CWE‑122).

Affected Systems

FreeRDP version 3.20.x and earlier are vulnerable. The issue is present in the main FreeRDP library used by many open‑source remote‑desktop clients. Version 3.21.0 and later contain the patch. Any system running a FreeRDP client that connects to an attacker‑controlled RDP server and accepts FastGlyph packets is affected.

Risk and Exploitability

The entry carries a CVSS score of 5.5, indicating moderate severity. Because the EPSS score is below 1%, the likelihood of this vulnerability being exploited in the wild is low, and it is not listed in the CISA KEV catalog. The attack requires the client to accept a malicious glyph packet from a remote server, which usually means the user must initiate a remote desktop session. The overflow leads only to a crash, not arbitrary code execution, making it a local or network‑limited denial of service.

Generated by OpenCVE AI on April 18, 2026 at 05:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to FreeRDP 3.21.0 or newer, where the FastGlyph buffer overflow bug is fixed.
  • If an upgrade is not yet possible, disable the FastGlyph feature or restrict connections to trusted RDP servers to mitigate the risk of receiving malicious glyph payloads.
  • Monitor client logs for repeated “FreeRDP crash” or memory errors, and ensure that crash recovery services restart the client to maintain service availability.

Generated by OpenCVE AI on April 18, 2026 at 05:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 28 Jan 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Tue, 20 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Freerdp
Freerdp freerdp
Vendors & Products Freerdp
Freerdp freerdp

Tue, 20 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Mon, 19 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
Description FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, FastGlyph parsing trusts `cbData`/remaining length and never validates against the minimum size implied by `cx/cy`. A malicious server can trigger a client‑side global buffer overflow, causing a crash (DoS). Version 3.21.0 contains a patch for the issue.
Title FreeRDP has heap-buffer-overflow in Glyph_Alloc
Weaknesses CWE-122
References
Metrics cvssV4_0

{'score': 5.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-20T15:34:21.309Z

Reserved: 2026-01-15T15:45:01.957Z

Link: CVE-2026-23732

cve-icon Vulnrichment

Updated: 2026-01-20T15:34:12.728Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T18:16:05.867

Modified: 2026-01-28T18:38:37.410

Link: CVE-2026-23732

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-19T17:12:57Z

Links: CVE-2026-23732 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:15:15Z

Weaknesses