CVE-2026-24678

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, A capture thread sends sample responses using a freed channel callback after a device channel close, leading to a use after free in ecam_channel_write. This vulnerability is fixed in 3.22.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

History

10 Feb 2026, 15:08

Type Values Removed Values Added
First Time Freerdp
Freerdp freerdp
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/FreeRDP/FreeRDP/commit/f3ab1a16139036179d9852745fdade18fec11600 - () https://github.com/FreeRDP/FreeRDP/commit/f3ab1a16139036179d9852745fdade18fec11600 - Patch
References () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6gvg-29wx-6v7h - () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6gvg-29wx-6v7h - Patch, Vendor Advisory
CPE cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

09 Feb 2026, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-09 19:15

Updated : 2026-02-10 15:08


NVD link : CVE-2026-24678

Mitre link : CVE-2026-24678

CVE.ORG link : CVE-2026-24678


JSON object : View

Products Affected

freerdp

  • freerdp
CWE
CWE-416

Use After Free