Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.4
Red Hat Remote Desktop Service Vulnerability - Unauthorized Access
RHSA-2026:3067
Summary
A security update is available for Red Hat Remote Desktop Service (FreeRDP) to fix a vulnerability that could allow an attacker to gain unauthorized access to a system. This update is important for organizations using the service to ensure the security of remote connections. Updates should be applied as soon as possible to prevent potential exploitation.
What to do
- Update redhat freerdp to version 2:2.11.7-1.el9_7.2.
- Update redhat freerdp-debuginfo to version 2:2.11.7-1.el9_7.2.
- Update redhat freerdp-debugsource to version 2:2.11.7-1.el9_7.2.
- Update redhat freerdp-devel to version 2:2.11.7-1.el9_7.2.
- Update redhat freerdp-libs to version 2:2.11.7-1.el9_7.2.
- Update redhat freerdp-libs-debuginfo to version 2:2.11.7-1.el9_7.2.
- Update redhat libwinpr to version 2:2.11.7-1.el9_7.2.
- Update redhat libwinpr-debuginfo to version 2:2.11.7-1.el9_7.2.
- Update redhat libwinpr-devel to version 2:2.11.7-1.el9_7.2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| redhat | freerdp | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp-debuginfo | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp-debugsource | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp-devel | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp-libs | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp-libs-debuginfo | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | libwinpr | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | libwinpr-debuginfo | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | libwinpr-devel | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp-debuginfo | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp-debugsource | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp-devel | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp-libs | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | freerdp-libs-debuginfo | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | libwinpr | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | libwinpr-debuginfo | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
| redhat | libwinpr-devel | <= 2:2.11.7-1.el9_7.2 | 2:2.11.7-1.el9_7.2 |
Original title
Red Hat Security Advisory: freerdp security update
osv CVSS3.1
7.4
- https://access.redhat.com/errata/RHSA-2026:3067 Vendor Advisory
- https://access.redhat.com/security/updates/classification/#important Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2429645 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2429649 Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2429653 Third Party Advisory
- https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_3067.j... Vendor Advisory
- https://access.redhat.com/security/cve/CVE-2026-22855 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-22855 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-22855 Vendor Advisory
- https://github.com/FreeRDP/FreeRDP/releases/tag/3.20.1 Third Party Advisory
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-rwp3-g84r-6mx9 Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-22858 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-22858 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-22858 Vendor Advisory
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qmqf-m84q-x896 Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2026-22859 Third Party Advisory
- https://www.cve.org/CVERecord?id=CVE-2026-22859 Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-22859 Vendor Advisory
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-56f5-76qv-2r36 Third Party Advisory
Published: 24 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026