Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2490: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RustDesk Client for Windows

0
Medium
VulnerabilityCVE-2026-2490cvecve-2026-2490cwe-59
Published: Fri Feb 20 2026 (02/20/2026, 22:24:43 UTC)
Source: CVE Database V5
Vendor/Project: RustDesk
Product: Client for Windows

Description

RustDesk Client for Windows Transfer File Link Following Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of RustDesk Client for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Transfer File feature. By uploading a symbolic link, an attacker can abuse the service to read arbitrary files. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-27909.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:46:50 UTC

Technical Analysis

CVE-2026-2490 is a vulnerability identified in RustDesk Client for Windows version 1.4.1, classified under CWE-59 (Improper Link Resolution Before File Access). The flaw resides in the Transfer File feature, where the application improperly handles symbolic links uploaded by a local attacker. By creating and uploading a symbolic link pointing to arbitrary files, an attacker who already has the ability to execute low-privileged code on the target system can trick the RustDesk client into reading and disclosing sensitive files. This occurs because the client resolves the symbolic link before accessing the file, allowing access to files outside the intended directory scope. The vulnerability enables information disclosure with SYSTEM-level privileges, significantly elevating the attacker's access to sensitive data. Exploitation does not require user interaction but does require local code execution privileges, limiting remote exploitation. The CVSS v3.0 base score is 5.5 (medium severity), reflecting the moderate complexity and impact focused on confidentiality. No patches or exploits are currently publicly available, but the vulnerability has been assigned and published by ZDI (ZDI-CAN-27909).

Potential Impact

The primary impact of CVE-2026-2490 is unauthorized disclosure of sensitive information on affected systems running RustDesk Client for Windows 1.4.1. Since the attacker can read arbitrary files with SYSTEM privileges, this could lead to exposure of critical system files, credentials, configuration data, or other confidential information. Such data leakage could facilitate further attacks, including privilege escalation or lateral movement within an organization’s network. The vulnerability does not affect data integrity or system availability directly but compromises confidentiality significantly. Organizations relying on RustDesk for remote desktop and file transfer operations may face increased risk of insider threats or local attackers exploiting this flaw to gather intelligence. The requirement for local code execution reduces the risk of remote exploitation but does not eliminate it, especially in environments where endpoint security is weak or where attackers have gained initial footholds.

Mitigation Recommendations

To mitigate CVE-2026-2490, organizations should: 1) Upgrade RustDesk Client for Windows to a version where this vulnerability is patched once available. 2) Until a patch is released, restrict local user permissions to prevent unauthorized code execution, especially on systems running RustDesk. 3) Implement strict endpoint security controls such as application whitelisting and behavior monitoring to detect and block unauthorized symbolic link creation or suspicious file transfer activities. 4) Audit and monitor file system access logs for unusual access patterns indicative of symbolic link abuse. 5) Educate users about the risks of running untrusted code locally and enforce least privilege principles to minimize the attack surface. 6) Consider network segmentation and limiting RustDesk client usage to trusted environments to reduce exposure. 7) Coordinate with RustDesk vendor for timely updates and advisories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-02-13T21:13:34.414Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6998e47bbe58cf853bd9f757

Added to database: 2/20/2026, 10:47:23 PM

Last enriched: 2/28/2026, 12:46:50 PM

Last updated: 4/7/2026, 6:50:39 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses