Cyber Posture

CVE-2026-23883

CriticalPublic PoC

Published: 19 January 2026

Published
19 January 2026
Modified
28 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0018 38.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, `xf_Pointer_New` frees `cursorPixels` on failure, then `pointer_free` calls `xf_Pointer_Free` and frees it again, triggering ASan UAF. A malicious server can trigger a client‑side use after free,…

more

causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the UAF vulnerability by requiring identification, reporting, and timely patching of FreeRDP to version 3.21.0 or later.

prevent

Implements memory protections like ASLR and non-executable heap to prevent exploitation of the double-free UAF for heap corruption and code execution.

detect

Enables vulnerability scanning to identify systems running vulnerable FreeRDP versions affected by this CVE.

Security SummaryAI

CVE-2026-23883 is a use-after-free (UAF) vulnerability, classified under CWE-416, affecting FreeRDP, a free implementation of the Remote Desktop Protocol (RDP), in versions prior to 3.21.0. The issue occurs in the client-side `xf_Pointer_New` function during pointer graphics handling, where `cursorPixels` is freed on failure, but `pointer_free` subsequently calls `xf_Pointer_Free` and frees it again, as detected by AddressSanitizer (ASan). This flaw carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with potential for high confidentiality, integrity, and availability impacts.

A malicious RDP server can exploit this vulnerability against clients using vulnerable FreeRDP versions by sending crafted pointer data during a connection. No user privileges or interaction are required, enabling remote attackers to trigger the client-side UAF. This results in a denial-of-service (DoS) via application crash, with potential for heap corruption and code execution depending on the allocator implementation and surrounding heap layout.

The FreeRDP security advisory (GHSA-qcrr-85qx-4p6x) and release notes for version 3.21.0 confirm a patch that resolves the double-free issue in the affected code paths, including changes in `xf_graphics.c` and `pointer.c`. Security practitioners should upgrade to FreeRDP 3.21.0 or later to mitigate the vulnerability.

Details

CWE(s)

Affected Products

freerdp
freerdp
≤ 3.21.0

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Client-side UAF vulnerability in FreeRDP (RDP client) exploited by malicious RDP server via crafted pointer data, enabling remote code execution or DoS, directly mapping to Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References