CVE-2026-30791
Risky Cryptography in RustDesk Client Enables Sensitive Data Exposure
Publication date: 2026-03-05
Last updated on: 2026-03-18
Assigner: VULSec Labs
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rustdesk | rustdesk | to 1.4.5 (inc) |
| rustdesk | rustdesk | to 1.4.5 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-684 | The code does not function according to its published specifications, potentially leading to incorrect usage. |
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Use of a Broken or Risky Cryptographic Algorithm issue found in the RustDesk Client (rustdesk-client) across multiple platforms including Windows, MacOS, Linux, iOS, Android, and WebClient. It affects versions up to 1.4.5. The problem lies in certain program files and routines (flutter/lib/common.Dart, hbb_common/src/config.Rs, parseRustdeskUri(), importConfig()) that handle configuration import, URI scheme handling, and CLI config modules. Due to the use of weak or broken cryptographic algorithms, an attacker could retrieve embedded sensitive data from the client.
How can this vulnerability impact me? :
This vulnerability can lead to the unauthorized retrieval of sensitive data embedded within the RustDesk Client configuration or communication. Because the cryptographic algorithm used is broken or risky, attackers may exploit this weakness to access confidential information, potentially compromising the security and privacy of remote desktop sessions or stored credentials.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The provided information does not include specific detection methods or commands to identify this vulnerability on a network or system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update RustDesk Client to a version later than 1.4.5, as the issue affects versions through 1.4.5.
Additionally, reviewing and adjusting the client configuration, especially related to cryptographic settings and imported configurations, may help reduce risk.
Using RustDesk Server Pro for encrypted configuration import and managing security settings through the client interface can also enhance protection.