The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-22859

CVE-2026-22859: FreeRDP Buffer Overflow Vulnerability

CVE-2026-22859 is a buffer overflow flaw in FreeRDP's URBDRC client that causes out-of-bounds reads through unchecked server-supplied values. This article covers the technical details, affected versions, and mitigation.

Published: January 23, 2026

CVE-2026-22859 Overview

CVE-2026-22859 is an out-of-bounds read vulnerability in FreeRDP, the free implementation of the Remote Desktop Protocol. Prior to version 3.20.1, the URBDRC (USB Redirection Virtual Channel) client does not perform proper bounds checking on server-supplied MSUSB_INTERFACE_DESCRIPTOR values. These unchecked values are subsequently used as indices in the libusb_udev_complete_msconfig_setup function, leading to an out-of-bounds memory read condition.

Critical Impact

A malicious RDP server can exploit this vulnerability to trigger out-of-bounds memory reads on connecting clients, potentially leading to information disclosure or denial of service through application crashes.

Affected Products

  • FreeRDP versions prior to 3.20.1
  • Systems using FreeRDP's URBDRC client for USB device redirection
  • Applications and distributions bundling vulnerable FreeRDP versions

Discovery Timeline

  • 2026-01-14 - CVE-2026-22859 published to NVD
  • 2026-01-20 - Last updated in NVD database

Technical Details for CVE-2026-22859

Vulnerability Analysis

This vulnerability exists in FreeRDP's USB Redirection Virtual Channel (URBDRC) client implementation. When a FreeRDP client connects to an RDP server with USB redirection enabled, the server provides USB configuration data including interface descriptors. The vulnerable code path in libusb_udev_complete_msconfig_setup accepts MSUSB_INTERFACE_DESCRIPTOR values from the server without validating that they fall within expected array boundaries.

The lack of bounds checking creates a classic out-of-bounds read condition (CWE-125). When a malicious server supplies descriptor values that exceed the allocated buffer size, the client reads memory beyond the intended data structure. This can result in exposure of sensitive memory contents or trigger a crash if the read access violates memory protection boundaries.

Root Cause

The root cause is insufficient input validation in the URBDRC client's USB configuration setup routine. The libusb_udev_complete_msconfig_setup function trusts server-supplied interface descriptor values without verifying they are within valid index ranges. This violates the security principle that all external input—especially data received from network peers—must be validated before use as array indices or memory offsets.

Attack Vector

The attack is network-based and requires user interaction, as a victim must initiate an RDP connection to a malicious server. The attack scenario involves:

  1. An attacker sets up a malicious RDP server configured to send crafted USB interface descriptor data
  2. A victim using a vulnerable FreeRDP client connects to the malicious server with USB redirection enabled
  3. During the USB configuration exchange, the server sends MSUSB_INTERFACE_DESCRIPTOR values with out-of-bounds indices
  4. The FreeRDP client processes these values without validation in libusb_udev_complete_msconfig_setup
  5. The out-of-bounds read occurs, potentially leaking memory contents back to the attacker or crashing the client application

The vulnerability mechanism involves the server providing malformed USB descriptor data that causes the client to read beyond allocated buffer boundaries. For technical details on the specific code paths affected, refer to the GitHub Security Advisory GHSA-56f5-76qv-2r36.

Detection Methods for CVE-2026-22859

Indicators of Compromise

  • FreeRDP client crashes during RDP sessions with USB redirection enabled
  • Unexpected application terminations when connecting to unfamiliar RDP servers
  • Memory access violations or segmentation faults in FreeRDP processes
  • Suspicious RDP server connections originating from untrusted networks

Detection Strategies

  • Monitor for FreeRDP client process crashes, particularly those with memory access violation error codes
  • Implement network monitoring to detect RDP connections to unrecognized or suspicious server addresses
  • Deploy endpoint detection solutions that can identify exploitation attempts targeting memory corruption vulnerabilities
  • Review system logs for abnormal termination of FreeRDP-related processes

Monitoring Recommendations

  • Enable verbose logging in FreeRDP clients to capture USB redirection activity details
  • Monitor for repeated connection attempts to RDP servers followed by immediate client crashes
  • Implement network traffic analysis for RDP protocol anomalies in USB redirection channels
  • Track FreeRDP version deployments across the organization to identify vulnerable installations

How to Mitigate CVE-2026-22859

Immediate Actions Required

  • Upgrade all FreeRDP installations to version 3.20.1 or later immediately
  • Audit systems and applications using FreeRDP as a dependency and update accordingly
  • Restrict RDP connections to trusted, verified servers only
  • Consider disabling USB redirection if not required for business operations

Patch Information

The vulnerability has been fixed in FreeRDP version 3.20.1. The fix implements proper bounds checking on server-supplied MSUSB_INTERFACE_DESCRIPTOR values before using them as array indices. Organizations should update to this version or later to remediate the vulnerability.

For detailed patch information, see the FreeRDP Release 3.20.1.

Workarounds

  • Disable USB device redirection (/usb:* or related command-line options) when connecting to untrusted RDP servers
  • Implement network-level controls to prevent connections to unknown or untrusted RDP servers
  • Use application whitelisting to control which RDP servers clients are permitted to connect to
  • Deploy the patched version as the primary mitigation; workarounds should only be temporary measures

To disable USB redirection when launching FreeRDP, omit the /usb: parameter from the command line or explicitly disable it in your configuration. Only enable USB redirection when connecting to trusted, verified RDP servers.

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeBuffer Overflow

  • Vendor/TechFreerdp

  • SeverityMEDIUM

  • CVSS Score5.6

  • EPSS Probability0.06%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-125
  • Technical References
  • FreeRDP Release 3.20.1
  • Vendor Resources
  • GitHub Security Advisory GHSA-56f5-76qv-2r36
  • Related CVEs
  • CVE-2026-33982: FreeRDP Buffer Overflow Vulnerability

  • CVE-2026-33984: FreeRDP Buffer Overflow Vulnerability

  • CVE-2026-33986: FreeRDP Buffer Overflow Vulnerability

  • CVE-2026-33987: FreeRDP Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English