Heap-Based Buffer Overflow in NeutrinoRDP Module of xrdp by Neutrino Labs
CVE-2026-32623

7.7HIGH

Key Information:

Status
Vendor
CVE Published:
17 April 2026

What is CVE-2026-32623?

The NeutrinoRDP module in xrdp is susceptible to a heap-based buffer overflow due to inadequate validation of fragmented virtual channel data size. This vulnerability can occur when proxying RDP sessions, allowing malicious actors to exploit the flaw, potentially resulting in memory corruption and facilitating Denial of Service (DoS) or Remote Code Execution (RCE) attacks. It is important to note that this risk is present only in configurations where the NeutrinoRDP module is explicitly enabled and compiled. Users should take precautionary measures and verify their xrdp setup by checking for --enable-neutrinordp in the command output. The vulnerability has been addressed in version 0.10.6.

Affected Version(s)

xrdp < 0.10.6

References

CVSS V4

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.