Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, Integer Underflow in update_read_cache_bitmap_order Function of FreeRDP's Core Library This vulnerability is fixed in 3.24.0.
Published: 2026-03-13
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The integer underflow occurs in the update_read_cache_bitmap_order function of FreeRDP's Core Library prior to version 3.24.0, as reported in the vendor’s advisory. The flaw involves an arithmetic error that can lead to incorrect memory handling, potentially causing a crash or service disruption on the affected system. The associated CWE identifiers (190, 191, 400, 789) indicate integer underflow, signed/unsigned conversion errors, resource exhaustion, and memory allocation failures.

Affected Systems

All installations of FreeRDP (FreeRDP:FreeRDP) running any version earlier than 3.24.0 are affected. The CVE advisory specifically mentions that the issue is fixed in 3.24.0, implying that versions prior to that release are vulnerable.

Risk and Exploitability

The CVSS score is 3.1, classifying the vulnerability as low severity. The EPSS score is below 1%, and it is not listed in the CISA KEV catalog, indicating a low likelihood of widespread exploitation. The attack vector is likely remote network‑based, as the flaw is triggered when a client sends bitmap order data to the server. Although exploitation requires a crafted RDP session, the low severity and low exploitation probability suggest that the immediate risk to thoroughly unpatched systems is modest, but prompt patching is still recommended to eliminate any risk of denial of service.

Generated by OpenCVE AI on March 17, 2026 at 16:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FreeRDP to version 3.24.0 or later to fix the integer underflow in the update_read_cache_bitmap_order function.

Generated by OpenCVE AI on March 17, 2026 at 16:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

Mon, 16 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Freerdp
Freerdp freerdp
Vendors & Products Freerdp
Freerdp freerdp

Sat, 14 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Low


Fri, 13 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.24.0, Integer Underflow in update_read_cache_bitmap_order Function of FreeRDP's Core Library This vulnerability is fixed in 3.24.0.
Title FreeRDP has an Integer Underflow in update_read_cache_bitmap_order Function of FreeRDP's Core Library
Weaknesses CWE-190
CWE-191
CWE-400
CWE-789
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-16T17:03:39.238Z

Reserved: 2026-03-04T16:26:02.898Z

Link: CVE-2026-29776

cve-icon Vulnrichment

Updated: 2026-03-16T17:03:36.463Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-13T19:54:33.203

Modified: 2026-03-17T14:33:19.853

Link: CVE-2026-29776

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-13T17:33:10Z

Links: CVE-2026-29776 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:39:38Z