Impact
FreeRDP’s URBDRC client incorrectly uses server‑supplied interface numbers as array indices without bounds checks, leading to an out‑of‑bounds read in libusb_udev_select_interface. This heap buffer overflow can leak memory contents. The flaw is categorized as CWE‑122 and CWE‑1285.
Affected Systems
The vulnerability affects all FreeRDP releases prior to version 3.22.0. Devices and systems employing FreeRDP for Remote Desktop Protocol sessions using the URBDRC component are at risk.
Risk and Exploitability
The CVSS v3.1 score of 8.7 places the issue in the high severity range. An EPSS score below 1 % indicates a low likelihood of widespread exploitation at present, and the flaw is not listed in CISA’s KEV catalog. Based on the description, it is inferred that exploitation would require an attacker to supply crafted USB interface numbers during an RDP session, implying a remote attack vector. The overflow can potentially allow an attacker to read memory content from the client side. Prompt mitigation is advised.
OpenCVE Enrichment
Ubuntu USN