CVE-2026-24683

FreeRDP is a free implementation of the Remote Desktop Protocol. ainput_send_input_event caches channel_callback in a local variable and later uses it without synchronization; a concurrent channel close can free or reinitialize the callback, leading to a use after free. Prior to 3.22.0, This vulnerability is fixed in 3.22.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

History

10 Feb 2026, 15:03

Type Values Removed Values Added
First Time Freerdp
Freerdp freerdp
References () https://github.com/FreeRDP/FreeRDP/commit/d9ca272dce7a776ab475e9b1a8e8c3d2968c8486 - () https://github.com/FreeRDP/FreeRDP/commit/d9ca272dce7a776ab475e9b1a8e8c3d2968c8486 - Patch
References () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-45pf-68pj-fg8q - () https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-45pf-68pj-fg8q - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*

09 Feb 2026, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-09 19:15

Updated : 2026-02-10 15:03


NVD link : CVE-2026-24683

Mitre link : CVE-2026-24683

CVE.ORG link : CVE-2026-24683


JSON object : View

Products Affected

freerdp

  • freerdp
CWE
CWE-416

Use After Free