Cyber Posture

CVE-2026-23531

CriticalPublic PoC

Published: 19 January 2026

Published
19 January 2026
Modified
28 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0014 33.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23531 is a critical-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Freerdp Freerdp. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 33.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and patching of flaws like the heap buffer overflow in FreeRDP's ClearCodec to prevent exploitation via crafted RDPGFX updates.

prevent

Implements memory protection mechanisms such as address space layout randomization and heap isolation to mitigate heap corruption and code execution risks from out-of-bounds reads/writes.

prevent

Mandates validation of protocol inputs like destination rectangles in RDP surface updates to prevent heap-based buffer overflows from invalid data.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Heap buffer overflow in FreeRDP client exploitable remotely by malicious RDP server via crafted RDPGFX updates, enabling code execution or DoS on client systems, directly mapping to Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, in ClearCodec, when `glyphData` is present, `clear_decompress` calls `freerdp_image_copy_no_overlap` without validating the destination rectangle, allowing an out-of-bounds read/write via crafted RDPGFX surface updates. A malicious server…

more

can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

Deeper analysisAI

CVE-2026-23531 is a heap buffer overflow vulnerability in FreeRDP, a free implementation of the Remote Desktop Protocol, affecting versions prior to 3.21.0. The issue resides in the ClearCodec component, where the `clear_decompress` function calls `freerdp_image_copy_no_overlap` without validating the destination rectangle when `glyphData` is present. This flaw enables out-of-bounds read/write operations through crafted RDPGFX surface updates, classified under CWE-122 (Heap-based Buffer Overflow) with a CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

A malicious RDP server can exploit this vulnerability against connecting FreeRDP clients over the network with no privileges or user interaction required. Successful exploitation triggers a client-side heap buffer overflow, reliably causing a denial-of-service via application crash, and potentially leading to heap corruption with code execution risk contingent on the memory allocator's behavior and surrounding heap layout.

The FreeRDP security advisory (GHSA-xj5h-9cr5-23c5) and release notes for version 3.21.0 detail the patch, which addresses the validation issue in `clear.c` at lines 1139-1145. Security practitioners should update affected FreeRDP clients to version 3.21.0 or later to mitigate the vulnerability.

Details

CWE(s)

Affected Products

freerdp
freerdp
≤ 3.21.0

CVEs Like This One

CVE-2026-23530Same product: Freerdp Freerdp
CVE-2026-23532Same product: Freerdp Freerdp
CVE-2026-22854Same product: Freerdp Freerdp
CVE-2026-23534Same product: Freerdp Freerdp
CVE-2026-23533Same product: Freerdp Freerdp
CVE-2026-31806Same product: Freerdp Freerdp
CVE-2026-33984Same product: Freerdp Freerdp
CVE-2026-33986Same product: Freerdp Freerdp
CVE-2026-31883Same product: Freerdp Freerdp
CVE-2026-33987Same product: Freerdp Freerdp

References