{"api_version":"1","generated_at":"2026-04-23T07:57:03+00:00","cve":"CVE-2022-24882","urls":{"html":"https://cve.report/CVE-2022-24882","api":"https://cve.report/api/cve/CVE-2022-24882.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24882","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24882"},"summary":{"title":"CVE-2022-24882","description":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-04-26 16:15:00","updated_at":"2023-11-07 03:44:00"},"problem_types":["NVD-CWE-Other"],"metrics":[],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/","name":"FEDORA-2022-dc48a89918","refsource":"","tags":[],"title":"[SECURITY] Fedora 36 Update: freerdp-2.7.0-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.gentoo.org/glsa/202210-24","name":"GLSA-202210-24","refsource":"GENTOO","tags":[],"title":"FreeRDP: Multiple Vulnerabilities (GLSA 202210-24) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95","name":"https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95","refsource":"MISC","tags":[],"title":"Can open a rdp session without username and password (#95) · Issues · GNOME / gnome-remote-desktop · GitLab","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/","name":"FEDORA-2022-a3e03a200b","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: freerdp-2.7.0-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/","name":"FEDORA-2022-b0a47f8060","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: freerdp-2.7.0-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh","name":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh","refsource":"CONFIRM","tags":[],"title":"Server side NTLM does not properly check parameters · Advisory · FreeRDP/FreeRDP · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0","name":"https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0","refsource":"MISC","tags":[],"title":"Release Release 2.7.0 · FreeRDP/FreeRDP · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/FreeRDP/FreeRDP/pull/7750","name":"https://github.com/FreeRDP/FreeRDP/pull/7750","refsource":"MISC","tags":[],"title":"Ntlm backport by akallabeth · Pull Request #7750 · FreeRDP/FreeRDP · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/","name":"FEDORA-2022-dc48a89918","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 36 Update: freerdp-2.7.0-1.fc36 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/","name":"FEDORA-2022-a3e03a200b","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: freerdp-2.7.0-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/","name":"FEDORA-2022-b0a47f8060","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: freerdp-2.7.0-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24882","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24882","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24882","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"fedoraproject","cpe5":"extra_packages_for_enterprise_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"24882","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"24882","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"24882","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"36","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"24882","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"freerdp","cpe5":"freerdp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-24882","qid":"182288","title":"Debian Security Update for freerdp2 (CVE-2022-24882)"},{"cve":"CVE-2022-24882","qid":"198818","title":"Ubuntu Security Notification for FreeRDP Vulnerabilities (USN-5461-1)"},{"cve":"CVE-2022-24882","qid":"282672","title":"Fedora Security Update for freerdp (FEDORA-2022-b0a47f8060)"},{"cve":"CVE-2022-24882","qid":"282673","title":"Fedora Security Update for freerdp (FEDORA-2022-a3e03a200b)"},{"cve":"CVE-2022-24882","qid":"282727","title":"Fedora Security Update for freerdp (FEDORA-2022-dc48a89918)"},{"cve":"CVE-2022-24882","qid":"710666","title":"Gentoo Linux FreeRDP Multiple Vulnerabilities (GLSA 202210-24)"},{"cve":"CVE-2022-24882","qid":"752334","title":"SUSE Enterprise Linux Security Update for freerdp (SUSE-SU-2022:2352-1)"},{"cve":"CVE-2022-24882","qid":"753105","title":"SUSE Enterprise Linux Security Update for freerdp (SUSE-SU-2022:2353-1)"},{"cve":"CVE-2022-24882","qid":"753200","title":"SUSE Enterprise Linux Security Update for freerdp (SUSE-SU-2022:2354-1)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-24882","STATE":"PUBLIC","TITLE":"Server side NTLM does not properly check parameters in FreeRDP"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"FreeRDP","version":{"version_data":[{"version_value":"< 2.7.0"}]}}]},"vendor_name":"FreeRDP"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-287: Improper Authentication"}]}]},"references":{"reference_data":[{"name":"https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0","refsource":"MISC","url":"https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0"},{"name":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh","refsource":"CONFIRM","url":"https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh"},{"name":"https://github.com/FreeRDP/FreeRDP/pull/7750","refsource":"MISC","url":"https://github.com/FreeRDP/FreeRDP/pull/7750"},{"name":"https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95","refsource":"MISC","url":"https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95"},{"refsource":"FEDORA","name":"FEDORA-2022-dc48a89918","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AELSWWBAM2YONRPGLWVDY6UNTLJERJYL/"},{"refsource":"FEDORA","name":"FEDORA-2022-a3e03a200b","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DOYKBQOHSRM7JQYUIYUWFOXI2JZ2J5RD/"},{"refsource":"FEDORA","name":"FEDORA-2022-b0a47f8060","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWR6KSIKXO4B2TXBB3WH6YTNYHN46OY/"},{"refsource":"GENTOO","name":"GLSA-202210-24","url":"https://security.gentoo.org/glsa/202210-24"}]},"source":{"advisory":"GHSA-6x5p-gp49-3jhh","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-04-26 16:15:00","lastModifiedDate":"2023-11-07 03:44:00","problem_types":["NVD-CWE-Other"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24882","Ordinal":"228170","Title":"CVE-2022-24882","CVE":"CVE-2022-24882","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24882","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}