Cyber Posture

CVE-2026-27951

MediumPublic PoC

Published: 25 February 2026

Published
25 February 2026
Modified
27 February 2026
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS Score 0.0008 23.6th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27951 is a medium-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Freerdp Freerdp. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 23.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Integer overflow triggers infinite loop DoS in FreeRDP (client/server) over unauthenticated network access, directly matching application exploitation for endpoint availability impact.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.23.0, the function `Stream_EnsureCapacity` can create an endless blocking loop. This may affect all client and server implementations using `FreeRDP`. For practical exploitation this will only work…

more

on 32bit systems where the available physical memory is `>= SIZE_MAX`. Version 3.23.0 contains a patch. No known workarounds are available.

Deeper analysisAI

CVE-2026-27951 is a vulnerability in FreeRDP, a free implementation of the Remote Desktop Protocol, affecting versions prior to 3.23.0. The issue lies in the Stream_EnsureCapacity function, which can enter an endless blocking loop due to an integer overflow or wraparound (CWE-190). This flaw impacts all client and server implementations that incorporate FreeRDP.

A remote attacker requires no privileges or user interaction and can exploit the vulnerability over the network with low attack complexity, as reflected in its CVSS v3.1 base score of 5.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). Exploitation causes a denial of service through the blocking loop, but is practically limited to 32-bit systems where available physical memory is greater than or equal to SIZE_MAX.

FreeRDP version 3.23.0 includes a patch addressing the vulnerability, with no known workarounds available. Mitigation details are documented in the GitHub security advisory at GHSA-qcfc-ghxr-h927 and the fixing commit at 118afc0b954ba9d5632b7836ad24e454555ed113.

Details

CWE(s)

Affected Products

freerdp
freerdp
≤ 3.23.0

CVEs Like This One

CVE-2026-31884Same product: Freerdp Freerdp
CVE-2026-26986Same product: Freerdp Freerdp
CVE-2026-24679Same product: Freerdp Freerdp
CVE-2026-24680Same product: Freerdp Freerdp
CVE-2026-25942Same product: Freerdp Freerdp
CVE-2026-24683Same product: Freerdp Freerdp
CVE-2026-27950Same product: Freerdp Freerdp
CVE-2026-25954Same product: Freerdp Freerdp
CVE-2026-24491Same product: Freerdp Freerdp
CVE-2026-24675Same product: Freerdp Freerdp

References