
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-39319 affects FreeRDP, a free implementation of the Remote Desktop Protocol (RDP). The vulnerability was discovered in versions <= 2.8.1 and involves missing input length validation in the urbdrc channel. The issue was patched in version 2.9.0 (GitHub Advisory).
The vulnerability stems from missing input length validation in the urbdrc (USB Redirection Virtual Channel) channel. The issue was fixed by adding input buffer length checks to prevent out-of-bounds data access. The fix included adding validation for OutputBufferSize and implementing Stream_CheckAndLogRequiredLength checks for data transfer operations (FreeRDP Commit).
A malicious server can exploit this vulnerability to trick a FreeRDP-based client into reading out-of-bounds data and sending it back to the server, potentially leading to information disclosure (GitHub Advisory, Red Hat Advisory).
The primary mitigation is to upgrade to FreeRDP version 2.9.0 or later which contains the fix. If unable to upgrade, users can avoid using the /usb redirection switch as a workaround (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."