CVE-2026-24678
Published: 09 February 2026
Summary
CVE-2026-24678 is a high-severity Use After Free (CWE-416) vulnerability in Freerdp Freerdp. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Use-after-free exploits that achieve arbitrary code execution are blocked or significantly hardened by non-executable pages and ASLR.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated network exploitation of FreeRDP use-after-free causes application DoS (T1190 for public-facing RDP exposure; T1499.004 for direct application exploitation leading to crash).
NVD Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, A capture thread sends sample responses using a freed channel callback after a device channel close, leading to a use after free in ecam_channel_write. This vulnerability is…
more
fixed in 3.22.0.
Deeper analysisAI
CVE-2026-24678 is a use-after-free vulnerability (CWE-416) affecting FreeRDP, a free implementation of the Remote Desktop Protocol, in versions prior to 3.22.0. The issue occurs when a capture thread sends sample responses using a freed channel callback after a device channel close, leading to a use-after-free condition in the ecam_channel_write function. Published on 2026-02-09, it has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
A remote, unauthenticated attacker with network access can exploit this vulnerability with low attack complexity and no user interaction required. Successful exploitation results in denial of service through high availability impact, such as application crashes, with no impact on confidentiality or integrity.
The vulnerability is addressed in FreeRDP version 3.22.0. Mitigation details are available in the FreeRDP security advisory at https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6gvg-29wx-6v7h and the fixing commit at https://github.com/FreeRDP/FreeRDP/commit/f3ab1a16139036179d9852745fdade18fec11600.
Details
- CWE(s)