Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.5

FreeRDP Remote Desktop Protocol: data corruption and crash

CVE-2026-27950
Summary

FreeRDP users who haven't updated to version 3.23.0 are at risk of data corruption and crashes when using the Remote Desktop Protocol with the SDL2 implementation. This is due to an incomplete fix for a previous security issue. To protect against this, update to the latest version of FreeRDP.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
freerdp freerdp <= 3.23.0 –
Original title
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, the fix for the heap-use-after-free described in CVE-2026-24680 is incomplete. While the vulnerable executi...
Original description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, the fix for the heap-use-after-free described in CVE-2026-24680 is incomplete. While the vulnerable execution flow referenced in the advisory exists in the SDL2 implementation, the fix appears to have been applied only to the SDL3 code path. In the SDL2 implementation, the pointer is not nulled after free. This creates a situation where the advisory suggests the vulnerability is fully resolved, while builds or environments still using SDL2 may retain the vulnerable logic. A complete fix is available in version 3.23.0.
nvd CVSS3.1 7.5
nvd CVSS4.0 5.5
Vulnerability type
CWE-416 Use After Free
Published: 25 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026