7.7 CVE-2026-32105

Enriched by CISA Patch
 

xrdp is an open source RDP server. In versions through 0.10.5, xrdp does not implement verification for the Message Authentication Code (MAC) signature of encrypted RDP packets when using the "Classic RDP Security" layer. While the sender correctly generates signatures, the receiving logic lacks the necessary implementation to validate the 8-byte integrity signature, causing it to be silently ignored. An unauthenticated attacker with man-in-the-middle (MITM) capabilities can exploit this missing check to modify encrypted traffic in transit without detection. It does not affect connections where the TLS security layer is enforced. This issue has been fixed in version 0.10.6. If users are unable to immediately upgrade, they should configure xrdp.ini to enforce TLS security (security_layer=tls) to ensure end-to-end integrity.
https://nvd.nist.gov/vuln/detail/CVE-2026-32105

Categories

CWE-354 : Improper Validation of Integrity Check Value
Improper validation of checksums before use results in an unnecessary risk that can easily be mitigated. The protocol specification describes the algorithm used for calculating the checksum. It is then a simple matter of implementing the calculation and verifying that the calculated checksum and the received checksum match. Improper verification of the calculated checksum and the received checksum can lead to far greater consequences.

References


 

AFFECTED (from MITRE)


Vendor Product Versions
neutrinolabs xrdp
  • < 0.10.6 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:* < 0.10.6


REMEDIATION


Patch

Url
https://github.com/neutrinolabs/xrdp/releases/tag/v0.10.6


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
145 Checksum Spoofing
Medium
463 Padding Oracle Crypto Attack
High
75 Manipulating Writeable Configuration Files
Very High