Impact
The vulnerability involves an out‑of‑bounds heap read triggered by a desynchronization in the ClearCodec glyph cache count within FreeRDP. When the cache count is incorrect, pixels from adjacent memory are rendered on screen, allowing an attacker to view memory contents that should not be exposed. This leads to information disclosure, potentially revealing sensitive data such as credentials or system information.
Affected Systems
FreeRDP implementations older than version 3.24.2 are affected. The vulnerability is present in all builds of the FreeRDP component prior to that release. Vendors distributing these older builds should verify their deployed versions against the 3.24.2 threshold.
Risk and Exploitability
The CVSS score of 5.9 indicates moderate severity. The EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog, implying no known widespread exploitation. Exploitation requires an attacker to send crafted Remote Desktop Protocol data to a vulnerable FreeRDP instance, likely over the network, and observe the rendered output. Because the issue arises during rendering, an attacker with visual access to the screen could obtain the data. The lack of a local privilege escalation component keeps the attack surface somewhat limited, but any user with screen access may still be at risk.
OpenCVE Enrichment