CVE-2025-4478: NULL Pointer Dereference
A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.
AI Analysis
Technical Summary
CVE-2025-4478 is a vulnerability identified in the FreeRDP component utilized by Anaconda's remote install feature on Red Hat Enterprise Linux 10, specifically version 3.0.0-beta1. The flaw arises from a NULL pointer dereference triggered by a crafted Remote Desktop Protocol (RDP) packet. When such a packet is received, it causes a segmentation fault that crashes the FreeRDP service, rendering it defunct and resulting in a denial of service condition. This issue manifests pre-boot, meaning it occurs during the early stages of system initialization, and recovery necessitates a full system reboot. The vulnerability does not compromise confidentiality or integrity but severely impacts availability by halting the remote installation process. The attack vector is network-based, requiring no privileges (AV:N/PR:N), but does require user interaction (UI:R) in the form of receiving the malicious packet. The scope is unchanged (S:U), indicating the impact is limited to the vulnerable component and does not propagate to other system components. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and assigned a CVSS v3.1 base score of 6.5 (medium severity). The vulnerability is particularly relevant for environments that utilize Red Hat Enterprise Linux 10’s remote install feature via Anaconda, especially in automated or remote deployment scenarios where FreeRDP is active. Since the flaw causes a service crash and requires reboot, it can disrupt automated provisioning and delay deployment processes. The lack of patches at the time of disclosure necessitates interim mitigations to reduce exposure.
Potential Impact
The primary impact of CVE-2025-4478 is a denial of service condition affecting the availability of the remote installation service on Red Hat Enterprise Linux 10 systems using FreeRDP version 3.0.0-beta1. Organizations relying on automated or remote installations via Anaconda could experience deployment failures or delays, potentially impacting large-scale provisioning or recovery operations. While confidentiality and integrity are not directly affected, the inability to complete installations or reboots without manual intervention can disrupt operational workflows and increase downtime. In critical infrastructure or cloud environments where rapid provisioning is essential, this could lead to cascading operational impacts. The requirement for a reboot to recover means that systems may remain offline or unresponsive until manual action is taken, increasing the risk of prolonged outages. Since exploitation requires no privileges and can be triggered remotely, exposed systems are vulnerable to denial of service attacks from unauthenticated attackers. However, the need for user interaction (receiving the crafted packet) and the limited scope reduce the overall risk compared to more severe vulnerabilities.
Mitigation Recommendations
1. Monitor Red Hat and FreeRDP vendor advisories closely and apply patches or updates as soon as they become available to address CVE-2025-4478. 2. Restrict network access to the RDP service used during the remote installation phase by implementing firewall rules or network segmentation to limit exposure to untrusted networks. 3. Disable or avoid using the remote install feature via Anaconda with FreeRDP version 3.0.0-beta1 in environments where it is not strictly necessary. 4. Implement network intrusion detection or anomaly detection systems to identify unusual RDP traffic patterns that could indicate exploitation attempts. 5. For automated deployment pipelines, incorporate health checks and fallback mechanisms to detect service crashes and trigger safe recovery procedures. 6. Educate system administrators to recognize symptoms of this denial of service and prepare for manual intervention (reboot) if needed. 7. Consider alternative remote installation methods or tools that do not rely on the vulnerable FreeRDP version until patches are applied. 8. Maintain up-to-date backups and recovery plans to minimize operational impact in case of prolonged service disruption.
Affected Countries
United States, Germany, United Kingdom, Japan, India, Canada, Australia, France, South Korea, Netherlands
CVE-2025-4478: NULL Pointer Dereference
Description
A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-4478 is a vulnerability identified in the FreeRDP component utilized by Anaconda's remote install feature on Red Hat Enterprise Linux 10, specifically version 3.0.0-beta1. The flaw arises from a NULL pointer dereference triggered by a crafted Remote Desktop Protocol (RDP) packet. When such a packet is received, it causes a segmentation fault that crashes the FreeRDP service, rendering it defunct and resulting in a denial of service condition. This issue manifests pre-boot, meaning it occurs during the early stages of system initialization, and recovery necessitates a full system reboot. The vulnerability does not compromise confidentiality or integrity but severely impacts availability by halting the remote installation process. The attack vector is network-based, requiring no privileges (AV:N/PR:N), but does require user interaction (UI:R) in the form of receiving the malicious packet. The scope is unchanged (S:U), indicating the impact is limited to the vulnerable component and does not propagate to other system components. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and assigned a CVSS v3.1 base score of 6.5 (medium severity). The vulnerability is particularly relevant for environments that utilize Red Hat Enterprise Linux 10’s remote install feature via Anaconda, especially in automated or remote deployment scenarios where FreeRDP is active. Since the flaw causes a service crash and requires reboot, it can disrupt automated provisioning and delay deployment processes. The lack of patches at the time of disclosure necessitates interim mitigations to reduce exposure.
Potential Impact
The primary impact of CVE-2025-4478 is a denial of service condition affecting the availability of the remote installation service on Red Hat Enterprise Linux 10 systems using FreeRDP version 3.0.0-beta1. Organizations relying on automated or remote installations via Anaconda could experience deployment failures or delays, potentially impacting large-scale provisioning or recovery operations. While confidentiality and integrity are not directly affected, the inability to complete installations or reboots without manual intervention can disrupt operational workflows and increase downtime. In critical infrastructure or cloud environments where rapid provisioning is essential, this could lead to cascading operational impacts. The requirement for a reboot to recover means that systems may remain offline or unresponsive until manual action is taken, increasing the risk of prolonged outages. Since exploitation requires no privileges and can be triggered remotely, exposed systems are vulnerable to denial of service attacks from unauthenticated attackers. However, the need for user interaction (receiving the crafted packet) and the limited scope reduce the overall risk compared to more severe vulnerabilities.
Mitigation Recommendations
1. Monitor Red Hat and FreeRDP vendor advisories closely and apply patches or updates as soon as they become available to address CVE-2025-4478. 2. Restrict network access to the RDP service used during the remote installation phase by implementing firewall rules or network segmentation to limit exposure to untrusted networks. 3. Disable or avoid using the remote install feature via Anaconda with FreeRDP version 3.0.0-beta1 in environments where it is not strictly necessary. 4. Implement network intrusion detection or anomaly detection systems to identify unusual RDP traffic patterns that could indicate exploitation attempts. 5. For automated deployment pipelines, incorporate health checks and fallback mechanisms to detect service crashes and trigger safe recovery procedures. 6. Educate system administrators to recognize symptoms of this denial of service and prepare for manual intervention (reboot) if needed. 7. Consider alternative remote installation methods or tools that do not rely on the vulnerable FreeRDP version until patches are applied. 8. Maintain up-to-date backups and recovery plans to minimize operational impact in case of prolonged service disruption.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-09T06:11:27.591Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebe54
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 2/27/2026, 2:34:30 PM
Last updated: 3/25/2026, 2:48:16 AM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.