CVE-2026-2490: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RustDesk Client for Windows
RustDesk Client for Windows Transfer File Link Following Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of RustDesk Client for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Transfer File feature. By uploading a symbolic link, an attacker can abuse the service to read arbitrary files. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-27909.
AI Analysis
Technical Summary
CVE-2026-2490 is a vulnerability identified in RustDesk Client for Windows version 1.4.1, classified under CWE-59 (Improper Link Resolution Before File Access). The flaw resides in the Transfer File feature, where the application improperly handles symbolic links uploaded by a local attacker. By creating and uploading a symbolic link pointing to arbitrary files, an attacker who already has the ability to execute low-privileged code on the target system can trick the RustDesk client into reading and disclosing sensitive files. This occurs because the client resolves the symbolic link before accessing the file, allowing access to files outside the intended directory scope. The vulnerability enables information disclosure with SYSTEM-level privileges, significantly elevating the attacker's access to sensitive data. Exploitation does not require user interaction but does require local code execution privileges, limiting remote exploitation. The CVSS v3.0 base score is 5.5 (medium severity), reflecting the moderate complexity and impact focused on confidentiality. No patches or exploits are currently publicly available, but the vulnerability has been assigned and published by ZDI (ZDI-CAN-27909).
Potential Impact
The primary impact of CVE-2026-2490 is unauthorized disclosure of sensitive information on affected systems running RustDesk Client for Windows 1.4.1. Since the attacker can read arbitrary files with SYSTEM privileges, this could lead to exposure of critical system files, credentials, configuration data, or other confidential information. Such data leakage could facilitate further attacks, including privilege escalation or lateral movement within an organization’s network. The vulnerability does not affect data integrity or system availability directly but compromises confidentiality significantly. Organizations relying on RustDesk for remote desktop and file transfer operations may face increased risk of insider threats or local attackers exploiting this flaw to gather intelligence. The requirement for local code execution reduces the risk of remote exploitation but does not eliminate it, especially in environments where endpoint security is weak or where attackers have gained initial footholds.
Mitigation Recommendations
To mitigate CVE-2026-2490, organizations should: 1) Upgrade RustDesk Client for Windows to a version where this vulnerability is patched once available. 2) Until a patch is released, restrict local user permissions to prevent unauthorized code execution, especially on systems running RustDesk. 3) Implement strict endpoint security controls such as application whitelisting and behavior monitoring to detect and block unauthorized symbolic link creation or suspicious file transfer activities. 4) Audit and monitor file system access logs for unusual access patterns indicative of symbolic link abuse. 5) Educate users about the risks of running untrusted code locally and enforce least privilege principles to minimize the attack surface. 6) Consider network segmentation and limiting RustDesk client usage to trusted environments to reduce exposure. 7) Coordinate with RustDesk vendor for timely updates and advisories.
Affected Countries
United States, Germany, China, India, United Kingdom, Canada, Australia, France, Japan, South Korea
CVE-2026-2490: CWE-59: Improper Link Resolution Before File Access ('Link Following') in RustDesk Client for Windows
Description
RustDesk Client for Windows Transfer File Link Following Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of RustDesk Client for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Transfer File feature. By uploading a symbolic link, an attacker can abuse the service to read arbitrary files. An attacker can leverage this vulnerability to disclose information in the context of SYSTEM. Was ZDI-CAN-27909.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2490 is a vulnerability identified in RustDesk Client for Windows version 1.4.1, classified under CWE-59 (Improper Link Resolution Before File Access). The flaw resides in the Transfer File feature, where the application improperly handles symbolic links uploaded by a local attacker. By creating and uploading a symbolic link pointing to arbitrary files, an attacker who already has the ability to execute low-privileged code on the target system can trick the RustDesk client into reading and disclosing sensitive files. This occurs because the client resolves the symbolic link before accessing the file, allowing access to files outside the intended directory scope. The vulnerability enables information disclosure with SYSTEM-level privileges, significantly elevating the attacker's access to sensitive data. Exploitation does not require user interaction but does require local code execution privileges, limiting remote exploitation. The CVSS v3.0 base score is 5.5 (medium severity), reflecting the moderate complexity and impact focused on confidentiality. No patches or exploits are currently publicly available, but the vulnerability has been assigned and published by ZDI (ZDI-CAN-27909).
Potential Impact
The primary impact of CVE-2026-2490 is unauthorized disclosure of sensitive information on affected systems running RustDesk Client for Windows 1.4.1. Since the attacker can read arbitrary files with SYSTEM privileges, this could lead to exposure of critical system files, credentials, configuration data, or other confidential information. Such data leakage could facilitate further attacks, including privilege escalation or lateral movement within an organization’s network. The vulnerability does not affect data integrity or system availability directly but compromises confidentiality significantly. Organizations relying on RustDesk for remote desktop and file transfer operations may face increased risk of insider threats or local attackers exploiting this flaw to gather intelligence. The requirement for local code execution reduces the risk of remote exploitation but does not eliminate it, especially in environments where endpoint security is weak or where attackers have gained initial footholds.
Mitigation Recommendations
To mitigate CVE-2026-2490, organizations should: 1) Upgrade RustDesk Client for Windows to a version where this vulnerability is patched once available. 2) Until a patch is released, restrict local user permissions to prevent unauthorized code execution, especially on systems running RustDesk. 3) Implement strict endpoint security controls such as application whitelisting and behavior monitoring to detect and block unauthorized symbolic link creation or suspicious file transfer activities. 4) Audit and monitor file system access logs for unusual access patterns indicative of symbolic link abuse. 5) Educate users about the risks of running untrusted code locally and enforce least privilege principles to minimize the attack surface. 6) Consider network segmentation and limiting RustDesk client usage to trusted environments to reduce exposure. 7) Coordinate with RustDesk vendor for timely updates and advisories.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- zdi
- Date Reserved
- 2026-02-13T21:13:34.414Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6998e47bbe58cf853bd9f757
Added to database: 2/20/2026, 10:47:23 PM
Last enriched: 2/28/2026, 12:46:50 PM
Last updated: 4/7/2026, 6:50:39 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.