Impact
The vulnerability is a double‑free bug in the Kerberos handling functions of FreeRDP. An attacker who triggers a failed authentication during an NLA session can cause the client to crash. The crash results in a denial‑of‑service but does not directly compromise confidentiality or integrity. The weakness corresponds to CWE‑415: Double Free.
Affected Systems
The flaw exists in all FreeRDP client releases prior to 3.24.2. It is relevant for installations that use Kerberos or Kerberos U2U authentication, such as systems configured as Samba AD members or using krb5 for NFS mounts. Any affected FreeRDP client on those systems can crash when a failed Kerberos authentication occurs.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. EPSS data is unavailable, and the vulnerability is not listed in CISA's KEV catalog. An attacker can exploit the flaw remotely during the NLA handshake; initiating a connection with Kerberos authentication that fails will trigger the double‑free and crash the client. The primary consequence is availability degradation for end users.
OpenCVE Enrichment