CVE-2026-33516
Published: 17 April 2026
Description
xrdp is an open source RDP server. Versions through 0.10.5 contain an out-of-bounds read vulnerability during the RDP capability exchange phase. The issue occurs when memory is accessed before validating the remaining buffer length. A remote, unauthenticated attacker can trigger…
more
this vulnerability by sending a specially crafted Confirm Active PDU. Successful exploitation could lead to a denial of service (process crash) or potential disclosure of sensitive information from the process memory. This issue has been fixed in version 0.10.6.
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely patching of xrdp to version 0.10.6 or later to remediate the out-of-bounds read vulnerability during RDP capability exchange.
Requires validation of incoming RDP Confirm Active PDU buffer lengths to prevent out-of-bounds memory access by remote attackers.
Implements memory protections such as ASLR and guard pages to mitigate denial-of-service crashes and sensitive information disclosure from out-of-bounds reads in xrdp.
Security SummaryAI
CVE-2026-33516 is an out-of-bounds read vulnerability (CWE-125) affecting xrdp, an open source Remote Desktop Protocol (RDP) server. The flaw exists in versions through 0.10.5 and occurs during the RDP capability exchange phase, where memory is accessed prior to validating the remaining buffer length. This high-severity issue, scored at CVSS 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H), was published on 2026-04-17.
A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted Confirm Active PDU to an affected xrdp instance. Successful exploitation may result in a denial of service via process crash or potential disclosure of sensitive information from the server's process memory, depending on the memory layout and contents at the time of the out-of-bounds access.
The xrdp project has addressed this vulnerability in version 0.10.6, as detailed in the release notes at https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6 and the security advisory at https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-rvh9-9wm3-28c7. Security practitioners should upgrade to 0.10.6 or later and consider network segmentation or firewalls to restrict RDP traffic until patching is complete.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated exploitation of a public-facing RDP server (xrdp) via crafted PDU enables initial access or lateral movement exploitation techniques (T1190, T1210) and application DoS via crash (T1499.004); potential memory disclosure aligns with exploitation impacts.