CVE-2025-4478: NULL Pointer Dereference
A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.
AI Analysis
Technical Summary
CVE-2025-4478 is a vulnerability identified in the FreeRDP component integrated into Anaconda's remote install feature on Red Hat Enterprise Linux 10, specifically version 3.0.0-beta1. The flaw arises from a NULL pointer dereference triggered by a specially crafted Remote Desktop Protocol (RDP) packet. When such a packet is received during the pre-boot phase, it causes a segmentation fault that crashes the remote install service, rendering it defunct and causing a denial of service condition. Recovery from this state requires a full system reboot. The vulnerability does not compromise confidentiality or integrity but severely impacts availability during the installation process. The attack vector is network-based, requiring no privileges but does require user interaction in the form of receiving the malicious packet. The vulnerability is rated with a CVSS 3.1 score of 6.5 (medium severity), reflecting the ease of exploitation and impact on availability. No known public exploits exist yet, but the flaw could disrupt automated or remote installations that rely on Anaconda's remote install feature using FreeRDP. The issue is particularly relevant for environments that perform remote OS deployments or installations over RDP on Red Hat Enterprise Linux 10 systems.
Potential Impact
For European organizations, the primary impact is disruption of remote installation workflows that utilize Anaconda's remote install feature with FreeRDP on RHEL 10. This could delay deployment of critical systems or updates, impacting operational continuity. Organizations relying on automated or remote provisioning in data centers or cloud environments may experience downtime or require manual intervention to reboot affected systems. While the vulnerability does not expose sensitive data or allow unauthorized code execution, the denial of service during installation could affect service availability and lead to increased operational costs. Critical infrastructure or industries with strict uptime requirements could be particularly affected if remote installation is part of their deployment or recovery processes. The lack of known exploits reduces immediate risk, but the medium severity score and ease of triggering the fault via network packets warrant proactive mitigation.
Mitigation Recommendations
1. Monitor Red Hat advisories and apply official patches or updates for FreeRDP and Anaconda as soon as they become available. 2. Restrict network access to the RDP port used during remote installation phases, ideally limiting it to trusted management networks or VPNs. 3. Disable or avoid using the remote install feature with FreeRDP in environments where it is not strictly necessary. 4. Implement network-level intrusion detection or anomaly detection systems to identify suspicious RDP traffic patterns during installation windows. 5. For critical deployments, consider alternative remote installation methods that do not rely on FreeRDP or RDP. 6. Prepare operational procedures to quickly reboot affected systems if a crash occurs, minimizing downtime. 7. Conduct security awareness training for administrators to recognize and respond to potential denial of service conditions during remote installs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-4478: NULL Pointer Dereference
Description
A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.
AI-Powered Analysis
Technical Analysis
CVE-2025-4478 is a vulnerability identified in the FreeRDP component integrated into Anaconda's remote install feature on Red Hat Enterprise Linux 10, specifically version 3.0.0-beta1. The flaw arises from a NULL pointer dereference triggered by a specially crafted Remote Desktop Protocol (RDP) packet. When such a packet is received during the pre-boot phase, it causes a segmentation fault that crashes the remote install service, rendering it defunct and causing a denial of service condition. Recovery from this state requires a full system reboot. The vulnerability does not compromise confidentiality or integrity but severely impacts availability during the installation process. The attack vector is network-based, requiring no privileges but does require user interaction in the form of receiving the malicious packet. The vulnerability is rated with a CVSS 3.1 score of 6.5 (medium severity), reflecting the ease of exploitation and impact on availability. No known public exploits exist yet, but the flaw could disrupt automated or remote installations that rely on Anaconda's remote install feature using FreeRDP. The issue is particularly relevant for environments that perform remote OS deployments or installations over RDP on Red Hat Enterprise Linux 10 systems.
Potential Impact
For European organizations, the primary impact is disruption of remote installation workflows that utilize Anaconda's remote install feature with FreeRDP on RHEL 10. This could delay deployment of critical systems or updates, impacting operational continuity. Organizations relying on automated or remote provisioning in data centers or cloud environments may experience downtime or require manual intervention to reboot affected systems. While the vulnerability does not expose sensitive data or allow unauthorized code execution, the denial of service during installation could affect service availability and lead to increased operational costs. Critical infrastructure or industries with strict uptime requirements could be particularly affected if remote installation is part of their deployment or recovery processes. The lack of known exploits reduces immediate risk, but the medium severity score and ease of triggering the fault via network packets warrant proactive mitigation.
Mitigation Recommendations
1. Monitor Red Hat advisories and apply official patches or updates for FreeRDP and Anaconda as soon as they become available. 2. Restrict network access to the RDP port used during remote installation phases, ideally limiting it to trusted management networks or VPNs. 3. Disable or avoid using the remote install feature with FreeRDP in environments where it is not strictly necessary. 4. Implement network-level intrusion detection or anomaly detection systems to identify suspicious RDP traffic patterns during installation windows. 5. For critical deployments, consider alternative remote installation methods that do not rely on FreeRDP or RDP. 6. Prepare operational procedures to quickly reboot affected systems if a crash occurs, minimizing downtime. 7. Conduct security awareness training for administrators to recognize and respond to potential denial of service conditions during remote installs.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2025-05-09T06:11:27.591Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f91484d88663aebe54
Added to database: 5/20/2025, 6:59:05 PM
Last enriched: 1/21/2026, 7:14:43 PM
Last updated: 2/7/2026, 2:27:56 PM
Views: 64
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.