CVE-2022-24883

HIGH

Freerdp < 2.7.0 - Authentication Bypass

Title source: rule
STIX 2.1

Description

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are affected. Version 2.7.0 contains a fix for this issue. As a workaround, use custom authentication via `HashCallback` and/or ensure the `SAM` database path configured is valid and the application has file handles left.

Scores

CVSS v3 7.4
EPSS 0.0094
EPSS Percentile 76.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-287
Status published
Products (4)
fedoraproject/fedora 34
fedoraproject/fedora 35
fedoraproject/fedora 36
freerdp/freerdp < 2.7.0
Published Apr 26, 2022
Tracked Since Feb 18, 2026