CVE-2026-24675
Published: 09 February 2026
Summary
CVE-2026-24675 is a high-severity Use After Free (CWE-416) vulnerability in Freerdp Freerdp. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 5.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Use-after-free exploits that achieve arbitrary code execution are blocked or significantly hardened by non-executable pages and ASLR.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free in FreeRDP enables remote exploitation of the RDP service resulting in memory corruption and application crash (DoS).
NVD Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, urb_select_interface can free the device's MS config on error but later code still dereferences it, leading to a use after free in libusb_udev_select_interface. This vulnerability is fixed…
more
in 3.22.0.
Deeper analysisAI
CVE-2026-24675 is a use-after-free vulnerability (CWE-416) affecting FreeRDP, a free implementation of the Remote Desktop Protocol, in versions prior to 3.22.0. The issue occurs in the urb_select_interface function, which can free the device's MS config structure on error, while later code in libusb_udev_select_interface continues to dereference it, resulting in memory corruption.
Attackers with network access can exploit this vulnerability remotely without authentication, privileges, or user interaction, as indicated by its CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). Successful exploitation leads to a denial of service, such as an application crash, with no impact on confidentiality or integrity.
The vulnerability is addressed in FreeRDP version 3.22.0. Mitigation involves updating to this patched release, as detailed in the FreeRDP GitHub security advisory (GHSA-x9jr-99h2-g7mj) and the fixing commit (d676518809c319eec15911c705c13536036af2ae).
Details
- CWE(s)