Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68670: CWE-121: Stack-based Buffer Overflow in neutrinolabs xrdp

0
Critical
VulnerabilityCVE-2025-68670cvecve-2025-68670cwe-121
Published: Tue Jan 27 2026 (01/27/2026, 15:52:41 UTC)
Source: CVE Database V5
Vendor/Project: neutrinolabs
Product: xrdp

Description

xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If exploited, the vulnerability could allow remote attackers to execute arbitrary code on the target system. The vulnerability allows an attacker to overwrite the stack buffer and the return address, which could theoretically be used to redirect the execution flow. The impact of this vulnerability is lessened if a compiler flag has been used to build the xrdp executable with stack canary protection. If this is the case, a second vulnerability would need to be used to leak the stack canary value. Upgrade to version 0.10.5 to receive a patch. Additionally, do not rely on stack canary protection on production systems.

AI-Powered Analysis

AILast updated: 02/04/2026, 08:37:44 UTC

Technical Analysis

The vulnerability CVE-2025-68670 affects neutrinolabs xrdp, an open-source Remote Desktop Protocol (RDP) server, in versions before 0.10.5. It is a stack-based buffer overflow (CWE-121) caused by improper bounds checking when processing user domain information during the connection handshake. This flaw allows a remote attacker to send crafted data that overflows the stack buffer, overwriting the return address and potentially enabling arbitrary code execution on the target system without requiring authentication or user interaction. The vulnerability's impact is severe, as it compromises integrity and availability by allowing attackers to execute malicious payloads remotely. Although compiling xrdp with stack canary protections can reduce the risk, bypassing such protections is possible if an attacker can leak the canary value through another vulnerability. The recommended remediation is to upgrade to xrdp version 0.10.5, which contains the patch for this issue. No public exploits are known yet, but the vulnerability's CVSS score of 9.1 reflects its critical nature and ease of exploitation over the network.

Potential Impact

For European organizations, this vulnerability poses a significant threat to systems running vulnerable xrdp versions, especially those exposing RDP services to untrusted networks or the internet. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, disrupt services, or move laterally within networks. This can result in data breaches, ransomware deployment, or espionage activities. Given the widespread use of xrdp in Linux-based remote access solutions across European enterprises, public institutions, and critical infrastructure, the risk is amplified. The unauthenticated nature of the exploit increases exposure, as attackers do not need valid credentials. Additionally, reliance on stack canaries as a sole mitigation is insufficient, emphasizing the need for patching. The vulnerability could also impact cloud environments and managed service providers using xrdp, potentially affecting multiple clients.

Mitigation Recommendations

1. Immediately upgrade all xrdp installations to version 0.10.5 or later to apply the official patch addressing this buffer overflow. 2. Restrict network exposure of RDP services by implementing strict firewall rules, allowing access only from trusted IP addresses or VPNs. 3. Employ network-level authentication (NLA) and multi-factor authentication (MFA) where possible to add layers of defense, even though the vulnerability is unauthenticated. 4. Conduct thorough audits of systems running xrdp to identify vulnerable versions and monitor for unusual connection attempts or crashes indicative of exploitation attempts. 5. Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect anomalous RDP traffic patterns. 6. Avoid relying solely on compiler-based mitigations like stack canaries; instead, combine patching with robust network segmentation and monitoring. 7. Educate system administrators on the importance of timely patching and monitoring of remote access services. 8. Consider deploying application-layer firewalls or RDP gateways that can provide additional filtering and logging.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-22T23:37:00.931Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6978e2684623b1157c350b44

Added to database: 1/27/2026, 4:06:00 PM

Last enriched: 2/4/2026, 8:37:44 AM

Last updated: 2/7/2026, 8:06:54 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats