CVE-2026-33516
Published: 17 April 2026
Summary
CVE-2026-33516 is a critical-severity Out-of-bounds Read (CWE-125) vulnerability in Neutrinolabs Xrdp. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely patching of xrdp to version 0.10.6 or later to remediate the out-of-bounds read vulnerability during RDP capability exchange.
Requires validation of incoming RDP Confirm Active PDU buffer lengths to prevent out-of-bounds memory access by remote attackers.
Implements memory protections such as ASLR and guard pages to mitigate denial-of-service crashes and sensitive information disclosure from out-of-bounds reads in xrdp.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated exploitation of a public-facing RDP server (xrdp) via crafted PDU enables initial access or lateral movement exploitation techniques (T1190, T1210) and application DoS via crash (T1499.004); potential memory disclosure aligns with exploitation impacts.
NVD Description
xrdp is an open source RDP server. Versions through 0.10.5 contain an out-of-bounds read vulnerability during the RDP capability exchange phase. The issue occurs when memory is accessed before validating the remaining buffer length. A remote, unauthenticated attacker can trigger…
more
this vulnerability by sending a specially crafted Confirm Active PDU. Successful exploitation could lead to a denial of service (process crash) or potential disclosure of sensitive information from the process memory. This issue has been fixed in version 0.10.6.
Deeper analysisAI
CVE-2026-33516 is an out-of-bounds read vulnerability (CWE-125) affecting xrdp, an open source Remote Desktop Protocol (RDP) server. The flaw exists in versions through 0.10.5 and occurs during the RDP capability exchange phase, where memory is accessed prior to validating the remaining buffer length. This high-severity issue, scored at CVSS 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H), was published on 2026-04-17.
A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted Confirm Active PDU to an affected xrdp instance. Successful exploitation may result in a denial of service via process crash or potential disclosure of sensitive information from the server's process memory, depending on the memory layout and contents at the time of the out-of-bounds access.
The xrdp project has addressed this vulnerability in version 0.10.6, as detailed in the release notes at https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6 and the security advisory at https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-rvh9-9wm3-28c7. Security practitioners should upgrade to 0.10.6 or later and consider network segmentation or firewalls to restrict RDP traffic until patching is complete.
Details
- CWE(s)