๐Ÿ” CVE Alert

CVE-2026-33952

MEDIUM 6.5

FreeRDP: DoS via WINPR_ASSERT in rts_read_auth_verifier_no_checks

CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
11th

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, an unvalidated auth_length field read from the network triggers a WINPR_ASSERT() failure in rts_read_auth_verifier_no_checks(), causing any FreeRDP client connecting through a malicious RDP Gateway to crash with SIGABRT. This is a pre-authentication denial of service affecting all FreeRDP clients using RPC-over-HTTP gateway transport. The assertion is active in default release builds (WITH_VERBOSE_WINPR_ASSERT=ON). This issue has been patched in version 3.24.2.

CWE CWE-617
Vendor freerdp
Product freerdp
Published Mar 30, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for freerdp freerdp

Be the first to know when new medium vulnerabilities affecting freerdp freerdp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

FreeRDP / FreeRDP
< 3.24.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4v4p-9v5x-hc93 github.com: https://github.com/FreeRDP/FreeRDP/commit/4ac0b6467d371a1ad47c1f751c5b305e4c068adb