Double-Free Vulnerability in FreeRDP Remote Desktop Implementation
CVE-2026-33995

5.3MEDIUM

Key Information:

Vendor

Freerdp

Status
Vendor
CVE Published:
30 March 2026

What is CVE-2026-33995?

FreeRDP, a widely used open-source implementation of the Remote Desktop Protocol, is susceptible to a double-free vulnerability that resides within the functions kerberos_AcceptSecurityContext() and kerberos_InitializeSecurityContextA(). This vulnerability can lead to a crash of any FreeRDP client on systems configured for Kerberos authentication, including those in a Samba Active Directory environment or utilizing krb5 for NFS. The issue manifests during Network Level Authentication (NLA) connection teardown, specifically when a failed authentication attempt occurs. Users are urged to upgrade to version 3.24.2 or later, where this vulnerability has been patched to ensure continued safe usage of FreeRDP.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

FreeRDP < 3.24.2

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.