
Cloud Vulnerability DB
A community-led vulnerabilities database
xrdp, an open source project providing graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP), was found to contain a critical buffer overflow vulnerability in versions prior to v0.9.21. The vulnerability, identified as CVE-2022-23480, exists in the devredir_proc_client_devlist_announce_req() function (GitHub Advisory, NVD).
The vulnerability is classified as a classic buffer overflow (CWE-120) with a CVSS v3.1 base score of 9.8 (Critical), indicating its severe nature. The attack vector is network-accessible (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N). The scope is unchanged (S:U), but the impact includes high potential for confidentiality, integrity, and availability compromise (C:H/I:H/A:H) (NVD).
The vulnerability could lead to out-of-bounds reads, potentially allowing attackers to crash the program or extract sensitive information. In affected systems, this could result in memory corruption or arbitrary code execution (Ubuntu Notice).
There are no known workarounds for this vulnerability. Users are strongly advised to upgrade to xrdp version 0.9.21 or later. Various Linux distributions have released security updates to address this issue, including Ubuntu and Debian (Debian Advisory, Ubuntu Notice).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."