Use After Free Vulnerability in FreeRDP Remote Desktop Protocol Implementation
CVE-2026-24684

8.7HIGH

Key Information:

Vendor

Freerdp

Status
Vendor
CVE Published:
9 February 2026

What is CVE-2026-24684?

FreeRDP, an open-source implementation of the Remote Desktop Protocol, is susceptible to a use after free vulnerability. This occurs within the RDPSND async playback thread, which can mistakenly process queued Protocol Data Units (PDUs) after the termination of the channel and the release of its internal state. Such a flaw can lead to unpredictable behavior and potential exploitation. The vulnerability has been mitigated in version 3.22.0. Developers and users are strongly urged to upgrade to the latest version to ensure security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

FreeRDP < 3.22.0

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.