First published: Tue Apr 26 2022(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.7.0 | |
Fedoraproject Extra Packages For Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24882 is a vulnerability in FreeRDP, a free implementation of the Remote Desktop Protocol (RDP), where NT LAN Manager (NTLM) authentication does not properly abort when an empty password is provided.
Versions of FreeRDP prior to 2.7.0 are affected by CVE-2022-24882.
CVE-2022-24882 has a severity score of 7.5 (critical).
To fix CVE-2022-24882, upgrade to FreeRDP version 2.7.0 or later.
More information about CVE-2022-24882 can be found at the following references: - [GitHub Pull Request #7750](https://github.com/FreeRDP/FreeRDP/pull/7750) - [FreeRDP 2.7.0 Release](https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0) - [GitHub Security Advisory GHSA-6x5p-gp49-3jhh](https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh)