CVE-2024-39917
xrdp vulnerability analysis and mitigation

Overview

CVE-2024-39917 affects xrdp, an open source RDP server, in versions prior to 0.10.0. The vulnerability was discovered and disclosed on July 12, 2024, impacting the login attempt limitation functionality. The vulnerability affects all xrdp installations using versions 0.9.26 and earlier (NVD, GitHub Advisory).

Technical details

The vulnerability stems from an ineffective implementation of the MaxLoginRetry parameter in /etc/xrdp/sesman.ini. This configuration parameter is designed to limit the number of login attempts but fails to function as intended. The issue has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) by NIST and 7.2 (HIGH) by GitHub, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L. The vulnerability is classified under CWE-307 (Improper Restriction of Excessive Authentication Attempts) (NVD).

Impact

The vulnerability allows attackers to make an infinite number of login attempts against the xrdp server, effectively bypassing the intended authentication rate limiting. This could potentially lead to successful brute force attacks against user credentials (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in xrdp version 0.10.0. For users unable to upgrade to version 0.10.0, recommended workarounds include restricting access to xrdp at the network layer using a firewall and not exposing xrdp to untrusted clients. Additionally, implementing other security measures such as pam_faillock(8) is advised. Note that xrdp 0.9.x is reaching End of Life (EoL) and no fixes are currently planned for that branch (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management