Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, a double-free vulnerability in kerberos_AcceptSecurityContext() and kerberos_InitializeSecurityContextA() (WinPR, winpr/libwinpr/sspi/Kerberos/kerberos.c) can cause a crash in any FreeRDP clients on systems where Kerberos and/or Kerberos U2U is configured (Samba AD member, or krb5 for NFS). The crash is triggered during NLA connection teardown and requires a failed authentication attempt. This issue has been patched in version 3.24.2.
Published: 2026-03-30
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a double‑free bug in the Kerberos handling functions of FreeRDP. An attacker who triggers a failed authentication during an NLA session can cause the client to crash. The crash results in a denial‑of‑service but does not directly compromise confidentiality or integrity. The weakness corresponds to CWE‑415: Double Free.

Affected Systems

The flaw exists in all FreeRDP client releases prior to 3.24.2. It is relevant for installations that use Kerberos or Kerberos U2U authentication, such as systems configured as Samba AD members or using krb5 for NFS mounts. Any affected FreeRDP client on those systems can crash when a failed Kerberos authentication occurs.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. EPSS data is unavailable, and the vulnerability is not listed in CISA's KEV catalog. An attacker can exploit the flaw remotely during the NLA handshake; initiating a connection with Kerberos authentication that fails will trigger the double‑free and crash the client. The primary consequence is availability degradation for end users.

Generated by OpenCVE AI on March 31, 2026 at 05:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FreeRDP to version 3.24.2 or later.

Generated by OpenCVE AI on March 31, 2026 at 05:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Freerdp
Freerdp freerdp
Weaknesses CWE-825
Vendors & Products Freerdp
Freerdp freerdp
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, a double-free vulnerability in kerberos_AcceptSecurityContext() and kerberos_InitializeSecurityContextA() (WinPR, winpr/libwinpr/sspi/Kerberos/kerberos.c) can cause a crash in any FreeRDP clients on systems where Kerberos and/or Kerberos U2U is configured (Samba AD member, or krb5 for NFS). The crash is triggered during NLA connection teardown and requires a failed authentication attempt. This issue has been patched in version 3.24.2.
Title FreeRDP: Possible double free in kerberos_AcceptSecurityContext
Weaknesses CWE-415
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-30T21:43:49.873Z

Reserved: 2026-03-24T22:20:06.212Z

Link: CVE-2026-33995

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-30T22:16:20.167

Modified: 2026-03-30T22:16:20.167

Link: CVE-2026-33995

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-30T21:43:49Z

Links: CVE-2026-33995 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:39:51Z

Weaknesses