Cyber Posture

CVE-2026-23534

CriticalPublic PoC

Published: 19 January 2026

Published
19 January 2026
Modified
28 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0015 35.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23534 is a critical-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Freerdp Freerdp. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 35.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, reporting, and correction of the heap buffer overflow flaw in FreeRDP by upgrading to the patched version 3.21.0.

prevent

Requires validation of untrusted inputs like crafted ClearCodec band coordinates to prevent writes beyond the destination surface buffer.

prevent

Implements memory protections such as ASLR and DEP to mitigate heap corruption and potential code execution from the buffer overflow.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The vulnerability is a client-side heap buffer overflow in FreeRDP exploited via a malicious RDP server, directly enabling arbitrary code execution through Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the ClearCodec bands decode path when crafted band coordinates allow writes past the end of the destination surface buffer.…

more

A malicious server can trigger a client‑side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code‑execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.

Deeper analysisAI

CVE-2026-23534 is a client-side heap buffer overflow vulnerability (CWE-122) in FreeRDP, an open-source implementation of the Remote Desktop Protocol (RDP). It affects versions prior to 3.21.0 and occurs in the ClearCodec bands decode path, where crafted band coordinates enable writes beyond the end of the destination surface buffer. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its critical severity due to high confidentiality, integrity, and availability impacts.

A remote attacker controlling a malicious RDP server can exploit this flaw against any connecting FreeRDP client without requiring authentication or user interaction. Successful exploitation triggers a heap buffer overflow, reliably causing a client-side crash for denial-of-service (DoS). Depending on the memory allocator and heap layout, it may also enable heap corruption, potentially leading to arbitrary code execution on the client system.

FreeRDP version 3.21.0 patches the issue with bounds checks in the ClearCodec decode path. The GitHub security advisory (GHSA-3frr-mp8w-4599) details the fix, with relevant code changes visible in libfreerdp/codec/clear.c at lines 878-879 and 883-884, and the release available at the 3.21.0 tag. Security practitioners should prioritize upgrading affected clients to mitigate risk.

Details

CWE(s)

Affected Products

freerdp
freerdp
≤ 3.21.0

CVEs Like This One

CVE-2026-23530Same product: Freerdp Freerdp
CVE-2026-23532Same product: Freerdp Freerdp
CVE-2026-22854Same product: Freerdp Freerdp
CVE-2026-23531Same product: Freerdp Freerdp
CVE-2026-23533Same product: Freerdp Freerdp
CVE-2026-31806Same product: Freerdp Freerdp
CVE-2026-33984Same product: Freerdp Freerdp
CVE-2026-33986Same product: Freerdp Freerdp
CVE-2026-31883Same product: Freerdp Freerdp
CVE-2026-33987Same product: Freerdp Freerdp

References