Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4478: NULL Pointer Dereference

0
Medium
VulnerabilityCVE-2025-4478cvecve-2025-4478
Published: Fri May 16 2025 (05/16/2025, 14:22:17 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:34:30 UTC

Technical Analysis

CVE-2025-4478 is a vulnerability identified in the FreeRDP component utilized by Anaconda's remote install feature on Red Hat Enterprise Linux 10, specifically version 3.0.0-beta1. The flaw arises from a NULL pointer dereference triggered by a crafted Remote Desktop Protocol (RDP) packet. When such a packet is received, it causes a segmentation fault that crashes the FreeRDP service, rendering it defunct and resulting in a denial of service condition. This issue manifests pre-boot, meaning it occurs during the early stages of system initialization, and recovery necessitates a full system reboot. The vulnerability does not compromise confidentiality or integrity but severely impacts availability by halting the remote installation process. The attack vector is network-based, requiring no privileges (AV:N/PR:N), but does require user interaction (UI:R) in the form of receiving the malicious packet. The scope is unchanged (S:U), indicating the impact is limited to the vulnerable component and does not propagate to other system components. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and assigned a CVSS v3.1 base score of 6.5 (medium severity). The vulnerability is particularly relevant for environments that utilize Red Hat Enterprise Linux 10’s remote install feature via Anaconda, especially in automated or remote deployment scenarios where FreeRDP is active. Since the flaw causes a service crash and requires reboot, it can disrupt automated provisioning and delay deployment processes. The lack of patches at the time of disclosure necessitates interim mitigations to reduce exposure.

Potential Impact

The primary impact of CVE-2025-4478 is a denial of service condition affecting the availability of the remote installation service on Red Hat Enterprise Linux 10 systems using FreeRDP version 3.0.0-beta1. Organizations relying on automated or remote installations via Anaconda could experience deployment failures or delays, potentially impacting large-scale provisioning or recovery operations. While confidentiality and integrity are not directly affected, the inability to complete installations or reboots without manual intervention can disrupt operational workflows and increase downtime. In critical infrastructure or cloud environments where rapid provisioning is essential, this could lead to cascading operational impacts. The requirement for a reboot to recover means that systems may remain offline or unresponsive until manual action is taken, increasing the risk of prolonged outages. Since exploitation requires no privileges and can be triggered remotely, exposed systems are vulnerable to denial of service attacks from unauthenticated attackers. However, the need for user interaction (receiving the crafted packet) and the limited scope reduce the overall risk compared to more severe vulnerabilities.

Mitigation Recommendations

1. Monitor Red Hat and FreeRDP vendor advisories closely and apply patches or updates as soon as they become available to address CVE-2025-4478. 2. Restrict network access to the RDP service used during the remote installation phase by implementing firewall rules or network segmentation to limit exposure to untrusted networks. 3. Disable or avoid using the remote install feature via Anaconda with FreeRDP version 3.0.0-beta1 in environments where it is not strictly necessary. 4. Implement network intrusion detection or anomaly detection systems to identify unusual RDP traffic patterns that could indicate exploitation attempts. 5. For automated deployment pipelines, incorporate health checks and fallback mechanisms to detect service crashes and trigger safe recovery procedures. 6. Educate system administrators to recognize symptoms of this denial of service and prepare for manual intervention (reboot) if needed. 7. Consider alternative remote installation methods or tools that do not rely on the vulnerable FreeRDP version until patches are applied. 8. Maintain up-to-date backups and recovery plans to minimize operational impact in case of prolonged service disruption.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-09T06:11:27.591Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe54

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/27/2026, 2:34:30 PM

Last updated: 3/24/2026, 12:40:13 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses