First published: Tue Apr 26 2022(Updated: )
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are affected. Version 2.7.0 contains a fix for this issue. As a workaround, use custom authentication via `HashCallback` and/or ensure the `SAM` database path configured is valid and the application has file handles left.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
FreeRDP FreeRDP | <2.7.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24883 is a vulnerability that affects the FreeRDP software prior to version 2.7.0.
CVE-2022-24883 allows for successful server-side authentication against an invalid SAM file path if configured.
FreeRDP versions up to but excluding 2.7.0 are affected by CVE-2022-24883.
No, FreeRDP based clients are not affected by CVE-2022-24883.
CVE-2022-24883 has a severity rating of 9.8, which is considered critical.
To fix CVE-2022-24883, users should update to FreeRDP version 2.7.0 or later.
Yes, more information about CVE-2022-24883 can be found in the references provided: [Reference 1](https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc), [Reference 2](https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144), [Reference 3](https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0).