Skip to main content

CVE-2025-4478: NULL Pointer Dereference

High
VulnerabilityCVE-2025-4478cvecve-2025-4478
Published: Fri May 16 2025 (05/16/2025, 14:22:17 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.

AI-Powered Analysis

AILast updated: 07/30/2025, 00:38:24 UTC

Technical Analysis

CVE-2025-4478 is a high-severity vulnerability affecting FreeRDP as used by Anaconda's remote install feature on Red Hat Enterprise Linux 10, specifically version 3.0.0-beta1. The flaw arises from a NULL pointer dereference triggered by a crafted Remote Desktop Protocol (RDP) packet. When exploited, this vulnerability causes a segmentation fault that crashes the service responsible for handling remote installs. The crash occurs pre-boot, meaning it affects the system initialization phase, and the service remains defunct until the system is rebooted. This results in a denial of service (DoS) condition, disrupting the remote installation process and potentially blocking automated or remote deployment workflows. The vulnerability requires no privileges (PR:N) and no authentication but does require user interaction (UI:R), indicating that an attacker must send a malicious RDP packet to the vulnerable service. The attack vector is network-based (AV:N), making it remotely exploitable. The impact is limited to availability (A:H) with no direct confidentiality or integrity compromise, but the disruption of critical installation services can have significant operational consequences. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation relies on monitoring and defensive controls until official fixes are released.

Potential Impact

For European organizations, especially those using Red Hat Enterprise Linux 10 with the affected FreeRDP version in their deployment or provisioning infrastructure, this vulnerability poses a risk of service disruption during system installations or re-installations. Organizations relying on automated or remote provisioning for critical infrastructure, cloud environments, or data centers could face delays and operational downtime due to the required system reboot to recover from the crash. This could impact service availability, delay deployments, and increase operational costs. Additionally, environments with strict uptime requirements or those managing large-scale deployments remotely may find recovery cumbersome. While the vulnerability does not expose data confidentiality or integrity directly, the denial of service could be leveraged as part of a broader attack strategy to disrupt business continuity or delay incident response activities.

Mitigation Recommendations

1. Monitor network traffic for anomalous or malformed RDP packets targeting the provisioning infrastructure to detect potential exploitation attempts. 2. Restrict network access to the Anaconda remote install service by implementing strict firewall rules and network segmentation, limiting exposure to trusted management networks only. 3. Disable or restrict the use of the remote install feature if not essential, or replace it with alternative provisioning methods until a patch is available. 4. Implement robust logging and alerting on the provisioning servers to quickly identify service crashes and initiate manual or automated recovery procedures. 5. Prepare operational procedures to perform rapid reboots and recovery in case of service crashes to minimize downtime. 6. Stay updated with Red Hat advisories and apply patches promptly once they are released. 7. Consider deploying intrusion prevention systems (IPS) capable of detecting and blocking malformed RDP packets targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-09T06:11:27.591Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe54

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/30/2025, 12:38:24 AM

Last updated: 8/5/2025, 12:34:50 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats