Vulnerability Name: | CVE-2022-24883 (CCN-225185) | ||||||||||||||||||||||||||||||||
Assigned: | 2022-04-26 | ||||||||||||||||||||||||||||||||
Published: | 2022-04-26 | ||||||||||||||||||||||||||||||||
Updated: | 2022-11-16 | ||||||||||||||||||||||||||||||||
Summary: | FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are affected. Version 2.7.0 contains a fix for this issue. As a workaround, use custom authentication via `HashCallback` and/or ensure the `SAM` database path configured is valid and the application has file handles left. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-287 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-24883 Source: XF Type: UNKNOWN freerdp-cve202224883-sec-bypass(225185) Source: MISC Type: Patch, Third Party Advisory https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc Source: MISC Type: Patch, Third Party Advisory https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144 Source: MISC Type: Release Notes, Third Party Advisory https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0 Source: CCN Type: FreeRDP GIT Repository FreeRDP Server authentication might allow invalid credentials to pass Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-dc48a89918 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-a3e03a200b Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2022-b0a47f8060 Source: GENTOO Type: Third Party Advisory GLSA-202210-24 Source: CCN Type: Mend Vulnerability Database CVE-2022-24883 | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |