Remote Desktop Protocol Implementation Vulnerability in FreeRDP
CVE-2026-33983

6.5MEDIUM

Key Information:

Vendor

Freerdp

Status
Vendor
CVE Published:
30 March 2026

What is CVE-2026-33983?

FreeRDP, a widely-used free implementation of the Remote Desktop Protocol, has a vulnerability in its progressive_decompress_tile_upgrade() function prior to version 3.24.2. The vulnerability arises from inadequate handling of a mismatch detected by progressive_rfx_quant_cmp_equal(), resulting in a warning via WLog_WARN while allowing execution to continue. This flaw allows an attacker to exploit a wrapped value that serves as a shift exponent, potentially triggering undefined behavior. The exploitation can lead to a denial of service by causing an approximately 80 billion iteration loop, significantly impacting CPU performance. The issue was addressed in version 3.24.2, ensuring users are advised to upgrade to mitigate risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

FreeRDP < 3.24.2

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.