CVE-2022-23613
moderate-risk
Published 2022-02-07
xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.
Do I need to act?
-
0.38% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Vendors
References (8)
Third Party Advisory
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8h98-h426-xf32
Third Party Advisory
https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-8h98-h426-xf32
35
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
1/34 · Minimal
Exposure
10/34 · Low