CVE-2026-33952 PUBLISHED

FreeRDP: DoS via WINPR_ASSERT in rts_read_auth_verifier_no_checks

Assigner: GitHub_M
Reserved: 24.03.2026 Published: 30.03.2026 Updated: 30.03.2026

FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.24.2, an unvalidated auth_length field read from the network triggers a WINPR_ASSERT() failure in rts_read_auth_verifier_no_checks(), causing any FreeRDP client connecting through a malicious RDP Gateway to crash with SIGABRT. This is a pre-authentication denial of service affecting all FreeRDP clients using RPC-over-HTTP gateway transport. The assertion is active in default release builds (WITH_VERBOSE_WINPR_ASSERT=ON). This issue has been patched in version 3.24.2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 6

Product Status

Vendor FreeRDP
Product FreeRDP
Versions
  • Version < 3.24.2 is affected

References

Problem Types

  • CWE-617: Reachable Assertion CWE