CVE-2025-4478: NULL Pointer Dereference
A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.
AI Analysis
Technical Summary
CVE-2025-4478 is a vulnerability identified in the FreeRDP component utilized by Anaconda's remote install feature on Red Hat Enterprise Linux 10, specifically affecting version 3.0.0-beta1. The flaw arises from a NULL pointer dereference triggered by a specially crafted Remote Desktop Protocol (RDP) packet. When such a packet is received, it causes a segmentation fault in the FreeRDP service, leading to a crash. This crash occurs during the pre-boot phase, which is critical because the affected service is essential for remote installation and potentially other remote management functions. Once the service crashes, it remains defunct, resulting in a denial of service condition that prevents further remote installation or management until the system is rebooted. The vulnerability does not expose confidential data or allow unauthorized access but compromises system availability and integrity by crashing a critical service. The CVSS 3.1 base score is 7.1, reflecting high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope remains unchanged (S:U), with no confidentiality impact (C:N), low integrity impact (I:L), and high availability impact (A:H). There are no known exploits in the wild at the time of publication, and no patches or mitigations have been explicitly linked yet. The vulnerability was reserved and published in May 2025 by Red Hat, indicating it is a recent discovery.
Potential Impact
For European organizations, this vulnerability poses a significant risk to systems running Red Hat Enterprise Linux 10 with the affected FreeRDP version, especially in environments relying on remote installation or management via Anaconda's remote install feature. The denial of service caused by the crash can disrupt deployment workflows, delay system provisioning, and impact operational continuity. Critical infrastructure, data centers, and cloud providers using automated or remote installation processes may experience outages or require manual intervention, increasing operational costs and downtime. While confidentiality is not directly impacted, the integrity and availability of affected systems are compromised, which could cascade into broader service disruptions. Organizations with strict uptime requirements or those operating in sectors like finance, healthcare, or government may face compliance and service level agreement (SLA) challenges. The requirement for a reboot to recover the service further complicates incident response and recovery, especially in large-scale or distributed environments.
Mitigation Recommendations
Organizations should immediately audit their Red Hat Enterprise Linux 10 deployments to identify systems running the vulnerable FreeRDP version 3.0.0-beta1. Until an official patch is released, consider disabling the Anaconda remote install feature or restricting network access to the RDP service to trusted management networks only. Implement network-level filtering or firewall rules to block unsolicited RDP packets from untrusted sources. Monitor system logs and network traffic for unusual RDP activity that could indicate exploitation attempts. Prepare incident response plans to handle potential denial of service events, including rapid reboot procedures and fallback installation methods. Engage with Red Hat support channels to obtain updates on patches or workarounds. For environments where remote installation is critical, consider alternative remote management tools or methods that do not rely on the vulnerable FreeRDP component. Finally, ensure that all systems are updated promptly once a patch becomes available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Finland
CVE-2025-4478: NULL Pointer Dereference
Description
A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.
AI-Powered Analysis
Technical Analysis
CVE-2025-4478 is a vulnerability identified in the FreeRDP component utilized by Anaconda's remote install feature on Red Hat Enterprise Linux 10, specifically affecting version 3.0.0-beta1. The flaw arises from a NULL pointer dereference triggered by a specially crafted Remote Desktop Protocol (RDP) packet. When such a packet is received, it causes a segmentation fault in the FreeRDP service, leading to a crash. This crash occurs during the pre-boot phase, which is critical because the affected service is essential for remote installation and potentially other remote management functions. Once the service crashes, it remains defunct, resulting in a denial of service condition that prevents further remote installation or management until the system is rebooted. The vulnerability does not expose confidential data or allow unauthorized access but compromises system availability and integrity by crashing a critical service. The CVSS 3.1 base score is 7.1, reflecting high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope remains unchanged (S:U), with no confidentiality impact (C:N), low integrity impact (I:L), and high availability impact (A:H). There are no known exploits in the wild at the time of publication, and no patches or mitigations have been explicitly linked yet. The vulnerability was reserved and published in May 2025 by Red Hat, indicating it is a recent discovery.
Potential Impact
For European organizations, this vulnerability poses a significant risk to systems running Red Hat Enterprise Linux 10 with the affected FreeRDP version, especially in environments relying on remote installation or management via Anaconda's remote install feature. The denial of service caused by the crash can disrupt deployment workflows, delay system provisioning, and impact operational continuity. Critical infrastructure, data centers, and cloud providers using automated or remote installation processes may experience outages or require manual intervention, increasing operational costs and downtime. While confidentiality is not directly impacted, the integrity and availability of affected systems are compromised, which could cascade into broader service disruptions. Organizations with strict uptime requirements or those operating in sectors like finance, healthcare, or government may face compliance and service level agreement (SLA) challenges. The requirement for a reboot to recover the service further complicates incident response and recovery, especially in large-scale or distributed environments.
Mitigation Recommendations
Organizations should immediately audit their Red Hat Enterprise Linux 10 deployments to identify systems running the vulnerable FreeRDP version 3.0.0-beta1. Until an official patch is released, consider disabling the Anaconda remote install feature or restricting network access to the RDP service to trusted management networks only. Implement network-level filtering or firewall rules to block unsolicited RDP packets from untrusted sources. Monitor system logs and network traffic for unusual RDP activity that could indicate exploitation attempts. Prepare incident response plans to handle potential denial of service events, including rapid reboot procedures and fallback installation methods. Engage with Red Hat support channels to obtain updates on patches or workarounds. For environments where remote installation is critical, consider alternative remote management tools or methods that do not rely on the vulnerable FreeRDP component. Finally, ensure that all systems are updated promptly once a patch becomes available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-09T06:11:27.591Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebe54
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 11/6/2025, 11:42:48 PM
Last updated: 11/20/2025, 7:12:18 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-5092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in lightgalleryteam LightGallery WP
MediumCVE-2025-12502: CWE-89 SQL Injection in attention-bar
UnknownCVE-2025-12778: CWE-862 Missing Authorization in userelements Ultimate Member Widgets for Elementor – WordPress User Directory
MediumCVE-2025-13451: SQL Injection in SourceCodester Online Shop Project
MediumCVE-2025-13450: Cross Site Scripting in SourceCodester Online Shop Project
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.