Skip to main content

CVE-2025-4478: NULL Pointer Dereference

High
VulnerabilityCVE-2025-4478cvecve-2025-4478
Published: Fri May 16 2025 (05/16/2025, 14:22:17 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.

AI-Powered Analysis

AILast updated: 09/26/2025, 00:27:26 UTC

Technical Analysis

CVE-2025-4478 is a high-severity vulnerability identified in the FreeRDP component utilized by Anaconda's remote installation feature on Red Hat Enterprise Linux 10, specifically version 3.0.0-beta1. The flaw arises from a NULL pointer dereference triggered by a specially crafted Remote Desktop Protocol (RDP) packet. When exploited, this vulnerability causes a segmentation fault leading to a crash of the affected service. The crash occurs pre-boot, which means it affects the system during its initialization phase, rendering the service defunct and resulting in a denial of service (DoS) condition. Recovery from this state requires a full system reboot. The CVSS 3.1 base score of 7.1 reflects a high severity level, with the vector indicating that the attack can be performed remotely (AV:N) without privileges (PR:N), but requires user interaction (UI:R). The impact is primarily on availability (A:H), with no direct confidentiality loss and limited integrity impact. No known exploits are currently in the wild, but the vulnerability's nature suggests that attackers could disrupt system availability remotely by sending malicious RDP packets during the installation phase. Since this affects the Anaconda installer’s remote install feature, environments relying on automated or remote installations using this mechanism are at risk. The absence of patches at the time of disclosure emphasizes the need for immediate mitigation strategies to prevent exploitation.

Potential Impact

For European organizations, the primary impact is a denial of service during system installation or provisioning phases that utilize the vulnerable Anaconda remote install feature with FreeRDP. This could disrupt deployment pipelines, delay system rollouts, and impact business continuity, especially in environments that rely on automated or remote provisioning of Red Hat Enterprise Linux 10 systems. Critical infrastructure sectors, cloud service providers, and enterprises with large-scale Linux deployments may face operational interruptions. Since the vulnerability requires user interaction, social engineering or insider involvement might be necessary, but the remote attack vector increases risk from external threat actors. The need for a reboot to recover could also lead to downtime in sensitive environments. Although confidentiality and integrity impacts are limited, availability disruptions in production or pre-production environments can have cascading effects on service delivery and compliance with uptime requirements under European regulations such as GDPR and NIS Directive.

Mitigation Recommendations

1. Avoid using the vulnerable version (3.0.0-beta1) of FreeRDP in Anaconda’s remote install feature until an official patch is released by Red Hat. 2. Where possible, disable or restrict remote installation features that rely on FreeRDP to trusted internal networks only, minimizing exposure to untrusted sources. 3. Implement network-level controls such as firewall rules and intrusion prevention systems to block or monitor suspicious RDP traffic targeting installation services. 4. Employ strict access controls and multi-factor authentication for users initiating remote installs to reduce the risk of malicious user interaction. 5. Monitor system logs and network traffic for abnormal RDP packets or service crashes during installation phases to detect potential exploitation attempts early. 6. Plan for rapid reboot procedures and incident response to minimize downtime if a crash occurs. 7. Stay updated with Red Hat advisories and apply patches promptly once available. 8. Consider alternative installation methods that do not rely on the vulnerable FreeRDP component for critical deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-09T06:11:27.591Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe54

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 9/26/2025, 12:27:26 AM

Last updated: 9/29/2025, 12:09:24 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats