CVE-2024-32041

9.8 CRITICAL

📋 TL;DR

FreeRDP clients using versions before 3.5.0 or 2.11.6 contain an out-of-bounds read vulnerability in the graphics pipeline. This could allow attackers to read sensitive memory contents or potentially crash the client. Anyone using vulnerable FreeRDP-based remote desktop clients is affected.

💻 Affected Systems

Products:
  • FreeRDP
  • Any software using FreeRDP library
Versions: All versions before 3.5.0 and 2.11.6
Operating Systems: Linux, Windows, macOS, BSD
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects clients, not servers. The /gfx option is enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise of the client machine, though this requires additional vulnerabilities to be chained.

🟠

Likely Case

Client application crash (denial of service) or information disclosure through memory read.

🟢

If Mitigated

No impact if patched or workaround applied with proper network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Out-of-bounds read vulnerabilities often lead to crashes but can be leveraged for information disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.0 or 2.11.6

Vendor Advisory: https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5r4p-mfx2-m44r

Restart Required: Yes

Instructions:

1. Update FreeRDP to version 3.5.0 or 2.11.6. 2. For Linux: Use package manager (apt/yum/dnf). 3. For Windows: Download from official releases. 4. Restart any FreeRDP client applications.

🔧 Temporary Workarounds

Disable GFX mode

all

Disable the vulnerable graphics pipeline by using alternative rendering options

xfreerdp /v:TARGET /bpp:32
xfreerdp /v:TARGET /rfx

🧯 If You Can't Patch

  • Disable FreeRDP client usage entirely
  • Implement strict network controls to limit RDP connections to trusted servers only

🔍 How to Verify

Check if Vulnerable:

Check FreeRDP version with: xfreerdp --version

Check Version:

xfreerdp --version | head -1

Verify Fix Applied:

Confirm version is 3.5.0 or higher, or 2.11.6 or higher

📡 Detection & Monitoring

Log Indicators:

  • FreeRDP client crashes
  • Memory access violation errors in application logs

Network Indicators:

  • Unusual RDP traffic patterns to FreeRDP clients
  • Connection attempts followed by client disconnections

SIEM Query:

source="*freerdp*" AND (event="crash" OR event="segfault" OR event="access_violation")

🔗 References

📤 Share & Export