Vulnerability Description
FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, A capture thread sends sample responses using a freed channel callback after a device channel close, leading to a use after free in ecam_channel_write. This vulnerability is fixed in 3.22.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freerdp | Freerdp | < 3.22.0 |
Related Weaknesses (CWE)
References
- https://github.com/FreeRDP/FreeRDP/commit/f3ab1a16139036179d9852745fdade18fec116Patch
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6gvg-29wx-6v7hPatchVendor Advisory
FAQ
What is CVE-2026-24678?
CVE-2026-24678 is a vulnerability with a CVSS score of 7.5 (HIGH). FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, A capture thread sends sample responses using a freed channel callback after a device channel close, leading to a use ...
How severe is CVE-2026-24678?
CVE-2026-24678 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24678?
Check the references section above for vendor advisories and patch information. Affected products include: Freerdp Freerdp.