Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2490: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RustDesk Client for Windows

0
Medium
VulnerabilityCVE-2026-2490cvecve-2026-2490cwe-59
Published: Fri Feb 20 2026 (02/20/2026, 22:24:43 UTC)
Source: CVE Database V5
Vendor/Project: RustDesk
Product: Client for Windows

Description

CVE-2026-2490 is a medium severity vulnerability in RustDesk Client for Windows version 1. 4. 1 involving improper link resolution before file access (CWE-59). It allows a local attacker with low-privileged code execution to upload symbolic links via the Transfer File feature, enabling disclosure of arbitrary files with SYSTEM-level privileges. Exploitation does not require user interaction but does require local code execution. The vulnerability impacts confidentiality but not integrity or availability. No known exploits are currently in the wild. Organizations using RustDesk Client on Windows should prioritize patching or mitigating this flaw to prevent sensitive information disclosure.

AI-Powered Analysis

AILast updated: 02/20/2026, 23:02:33 UTC

Technical Analysis

CVE-2026-2490 is a vulnerability identified in RustDesk Client for Windows (version 1.4.1) related to improper link resolution before file access, categorized under CWE-59 ('Link Following'). The flaw exists in the Transfer File feature, where the application fails to properly validate symbolic links uploaded by a local attacker. By crafting and uploading a symbolic link, an attacker who already has the ability to execute low-privileged code on the target system can trick RustDesk into reading arbitrary files on the system. This leads to disclosure of sensitive information with SYSTEM-level privileges, significantly elevating the impact of the initial low-privileged code execution. The vulnerability does not require user interaction and has a CVSS v3 base score of 5.5, reflecting medium severity. The attack vector is local (AV:L), with low attack complexity (AC:L), requiring privileges (PR:L), and no user interaction (UI:N). The vulnerability affects confidentiality (C:H) but not integrity or availability. No patches or known exploits have been reported at the time of publication. This vulnerability was assigned by the Zero Day Initiative (ZDI) and publicly disclosed on February 20, 2026.

Potential Impact

The primary impact of CVE-2026-2490 is unauthorized disclosure of sensitive information on affected systems running RustDesk Client for Windows 1.4.1. Since the vulnerability allows reading arbitrary files with SYSTEM privileges, attackers can access highly sensitive data including system configuration, credentials, or other confidential files. This can facilitate further attacks such as privilege escalation, lateral movement, or data exfiltration. Although exploitation requires prior local code execution, the elevation of information access to SYSTEM context significantly increases the risk. Organizations relying on RustDesk for remote desktop or file transfer services may face data breaches, compliance violations, and operational risks if this vulnerability is exploited. The lack of known exploits in the wild currently reduces immediate threat but does not eliminate future risk, especially in environments where local code execution is possible.

Mitigation Recommendations

To mitigate CVE-2026-2490, organizations should first verify if they are running RustDesk Client for Windows version 1.4.1. Since no official patches are currently available, immediate mitigation includes restricting local user permissions to prevent unauthorized code execution, thereby reducing the attack surface. Administrators should monitor and control file system permissions to prevent creation or manipulation of symbolic links by untrusted users. Employ application whitelisting and endpoint protection solutions to detect and block suspicious local activities related to symbolic link creation or exploitation attempts. Network segmentation and strict access controls can limit exposure of systems running RustDesk. Additionally, organizations should maintain vigilance for updates or patches from RustDesk and apply them promptly once released. Conducting regular audits of file transfer logs and system events may help detect exploitation attempts early.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-02-13T21:13:34.414Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6998e47bbe58cf853bd9f757

Added to database: 2/20/2026, 10:47:23 PM

Last enriched: 2/20/2026, 11:02:33 PM

Last updated: 2/21/2026, 12:00:00 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats