Impact
The vulnerability arises from a heap-buffer-overflow READ in FreeRDP’s winpr_aligned_offset_recalloc() function, allowing a user to read 24 bytes before the allocated buffer. This out-of-bounds read can expose sensitive data stored adjacent to the buffer, potentially leading to confidential information leakage. The weakness is identified as a classic buffer read overflow and is most closely associated with CWE-125.
Affected Systems
FreeRDP software versions earlier than 3.24.2 are affected. The issue exists in the open-source FreeRDP implementation of the Remote Desktop Protocol; all deployments using these older versions are susceptible.
Risk and Exploitability
The CVSS score indicates moderate severity (7.1) but the EPSS score is below 1%, suggesting a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, further indicating limited known exploitation. Attackers would most likely need to craft a malicious RDP connection or client that causes the vulnerable allocation pattern, implying a remote attack vector.
OpenCVE Enrichment