Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4478: NULL Pointer Dereference

0
Medium
VulnerabilityCVE-2025-4478cvecve-2025-4478
Published: Fri May 16 2025 (05/16/2025, 14:22:17 UTC)
Source: CVE
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.

AI-Powered Analysis

AILast updated: 01/21/2026, 19:14:43 UTC

Technical Analysis

CVE-2025-4478 is a vulnerability identified in the FreeRDP component integrated into Anaconda's remote install feature on Red Hat Enterprise Linux 10, specifically version 3.0.0-beta1. The flaw arises from a NULL pointer dereference triggered by a specially crafted Remote Desktop Protocol (RDP) packet. When such a packet is received during the pre-boot phase, it causes a segmentation fault that crashes the remote install service, rendering it defunct and causing a denial of service condition. Recovery from this state requires a full system reboot. The vulnerability does not compromise confidentiality or integrity but severely impacts availability during the installation process. The attack vector is network-based, requiring no privileges but does require user interaction in the form of receiving the malicious packet. The vulnerability is rated with a CVSS 3.1 score of 6.5 (medium severity), reflecting the ease of exploitation and impact on availability. No known public exploits exist yet, but the flaw could disrupt automated or remote installations that rely on Anaconda's remote install feature using FreeRDP. The issue is particularly relevant for environments that perform remote OS deployments or installations over RDP on Red Hat Enterprise Linux 10 systems.

Potential Impact

For European organizations, the primary impact is disruption of remote installation workflows that utilize Anaconda's remote install feature with FreeRDP on RHEL 10. This could delay deployment of critical systems or updates, impacting operational continuity. Organizations relying on automated or remote provisioning in data centers or cloud environments may experience downtime or require manual intervention to reboot affected systems. While the vulnerability does not expose sensitive data or allow unauthorized code execution, the denial of service during installation could affect service availability and lead to increased operational costs. Critical infrastructure or industries with strict uptime requirements could be particularly affected if remote installation is part of their deployment or recovery processes. The lack of known exploits reduces immediate risk, but the medium severity score and ease of triggering the fault via network packets warrant proactive mitigation.

Mitigation Recommendations

1. Monitor Red Hat advisories and apply official patches or updates for FreeRDP and Anaconda as soon as they become available. 2. Restrict network access to the RDP port used during remote installation phases, ideally limiting it to trusted management networks or VPNs. 3. Disable or avoid using the remote install feature with FreeRDP in environments where it is not strictly necessary. 4. Implement network-level intrusion detection or anomaly detection systems to identify suspicious RDP traffic patterns during installation windows. 5. For critical deployments, consider alternative remote installation methods that do not rely on FreeRDP or RDP. 6. Prepare operational procedures to quickly reboot affected systems if a crash occurs, minimizing downtime. 7. Conduct security awareness training for administrators to recognize and respond to potential denial of service conditions during remote installs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-05-09T06:11:27.591Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebe54

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 1/21/2026, 7:14:43 PM

Last updated: 2/7/2026, 2:27:56 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats