Cyber Posture

CVE-2026-23732

HighPublic PoC

Published: 19 January 2026

Published
19 January 2026
Modified
28 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0013 32.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23732 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Freerdp Freerdp. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 32.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

Buffer overflow in FreeRDP client enables malicious RDP server to trigger DoS via crafted FastGlyph data over the protocol.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, FastGlyph parsing trusts `cbData`/remaining length and never validates against the minimum size implied by `cx/cy`. A malicious server can trigger a client‑side global buffer overflow, causing…

more

a crash (DoS). Version 3.21.0 contains a patch for the issue.

Deeper analysisAI

CVE-2026-23732 is a buffer overflow vulnerability (CWE-122) in the FastGlyph parsing functionality of FreeRDP, a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 3.21.0, the parser trusts the `cbData` or remaining length fields without validating them against the minimum size implied by the `cx` and `cy` dimensions, leading to a client-side global buffer overflow. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), highlighting its potential for high-impact denial of service.

A malicious RDP server can exploit this vulnerability against any client using a vulnerable FreeRDP version by sending crafted FastGlyph data during a connection. No special privileges or user interaction are required, and exploitation occurs over the network with low complexity. Successful exploitation results in a client crash, enabling denial-of-service (DoS) attacks that disrupt remote desktop sessions.

Mitigation is addressed in FreeRDP version 3.21.0, which includes a patch for the FastGlyph parsing issue, as detailed in the project's GitHub release notes and related code changes in files such as glyph.c, color.c, graphics.c, and orders.c. Security practitioners should advise users to update to 3.21.0 or later and avoid connecting to untrusted RDP servers.

Details

CWE(s)

Affected Products

freerdp
freerdp
≤ 3.21.0

CVEs Like This One

CVE-2026-23533Same product: Freerdp Freerdp
CVE-2026-23532Same product: Freerdp Freerdp
CVE-2026-23531Same product: Freerdp Freerdp
CVE-2026-24679Same product: Freerdp Freerdp
CVE-2026-22856Same product: Freerdp Freerdp
CVE-2026-24682Same product: Freerdp Freerdp
CVE-2026-31806Same product: Freerdp Freerdp
CVE-2026-23530Same product: Freerdp Freerdp
CVE-2026-23534Same product: Freerdp Freerdp
CVE-2026-22854Same product: Freerdp Freerdp

References