Heap Buffer Overflow in FreeRDP Remote Desktop Protocol Implementation
CVE-2026-22852

6.8MEDIUM

Key Information:

Vendor

Freerdp

Status
Vendor
CVE Published:
14 January 2026

What is CVE-2026-22852?

The FreeRDP Client, an open-source implementation of the Remote Desktop Protocol, is susceptible to a heap buffer overflow due to improper processing of Audio Input (AUDIN) format lists by malicious RDP servers. Specifically, the flaw occurs when handling MSG_SNDIN_FORMATS PDUs, leading to an overwriting of memory boundaries and resulting in potential application crashes. This vulnerability is addressed in version 3.20.1, which mitigates the risk of memory corruption through better management of the callback's formats count.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

FreeRDP < 3.20.1

References

CVSS V4

Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.