Learn about CVE-2022-24883 where FreeRDP server authentication prior to version 2.7.0 allowed invalid credentials to pass. Find out the impact, technical details, and mitigation steps.
FreeRDP Server authentication might allow invalid credentials to pass.
Understanding CVE-2022-24883
FreeRDP, a free implementation of the Remote Desktop Protocol (RDP), had a vulnerability in server-side authentication prior to version 2.7.0, where it could authenticate against an invalid
SAM
file path with invalid credentials. This issue affects RDP server implementations using FreeRDP authentication.
What is CVE-2022-24883?
Prior to version 2.7.0, FreeRDP allowed server-side authentication against an invalid
SAM
file path with invalid credentials, potentially granting unauthorized access to attackers.
The Impact of CVE-2022-24883
This vulnerability could lead to unauthorized access to systems using RDP server implementations that authenticate against
SAM
files with invalid paths in FreeRDP versions prior to 2.7.0.
Technical Details of CVE-2022-24883
The vulnerability was classified as CWE-287: Improper Authentication with a CVSSv3.1 base score of 7.4 (High).
Vulnerability Description
FreeRDP versions before 2.7.0 allowed for successful authentication against an invalid
SAM
file path with incorrect credentials.
Affected Systems and Versions
Exploitation Mechanism
Attackers could exploit this vulnerability by leveraging the improper handling of
SAM
file paths in server-side authentication processes to gain unauthorized access.
Mitigation and Prevention
It is crucial to take immediate steps to secure systems vulnerable to CVE-2022-24883 and implement long-term security practices to prevent similar incidents in the future.
Immediate Steps to Take
HashCallback
as a workaround.Long-Term Security Practices
Patching and Updates
Ensure all FreeRDP server implementations are updated to version 2.7.0 or above to safeguard against this vulnerability.