Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30783: CWE-602 in rustdesk-client RustDesk Client

0
High
VulnerabilityCVE-2026-30783cvecve-2026-30783cwe-602cwe-841
Published: Thu Mar 05 2026 (03/05/2026, 15:52:21 UTC)
Source: CVE Database V5
Vendor/Project: rustdesk-client
Product: RustDesk Client

Description

A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Client signaling, API sync loop, config management modules) allows Privilege Abuse. This vulnerability is associated with program files src/rendezvous_mediator.Rs, src/hbbs_http/sync.Rs and program routines API sync loop, api-server config handling. This issue affects RustDesk Client: through 1.4.5.

AI-Powered Analysis

AILast updated: 03/05/2026, 16:35:47 UTC

Technical Analysis

CVE-2026-30783 is a vulnerability classified under CWE-602 (Improper Authorization) and CWE-841 (Improper Enforcement of Restrictions on User/Client Inputs) affecting RustDesk Client up to version 1.4.5 across multiple operating systems including Windows, MacOS, Linux, iOS, Android, and WebClient. The flaw resides in the client signaling, API synchronization loop, and configuration management components, particularly in the source files src/rendezvous_mediator.Rs and src/hbbs_http/sync.Rs. These modules handle critical functions such as client-server signaling, API synchronization, and configuration updates. Due to improper authorization checks, an attacker can abuse privileges without requiring authentication or user interaction, potentially manipulating API sync loops or configuration settings to escalate privileges or execute unauthorized commands. The vulnerability has a CVSS 4.0 base score of 8.8, reflecting its network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on integrity with some impact on availability. Although no exploits have been observed in the wild yet, the vulnerability poses a serious threat to environments relying on RustDesk for remote access and collaboration. The lack of available patches at the time of disclosure necessitates immediate defensive measures to mitigate risk.

Potential Impact

The impact of CVE-2026-30783 is significant for organizations using RustDesk Client as it allows attackers to abuse privileges remotely without authentication or user interaction. This can lead to unauthorized access, manipulation of client configurations, disruption of synchronization processes, and potential lateral movement within networks. The integrity of remote sessions and configurations can be compromised, possibly enabling attackers to execute arbitrary commands or alter system states. For enterprises relying on RustDesk for remote support, collaboration, or administration, this vulnerability could result in data breaches, operational disruptions, and loss of trust. Given RustDesk's cross-platform nature, a wide range of devices including desktops, mobile devices, and web clients are at risk, increasing the attack surface. The absence of known exploits currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency of addressing this vulnerability to prevent future exploitation.

Mitigation Recommendations

1. Immediately restrict network access to RustDesk Client services by implementing firewall rules and network segmentation to limit exposure to trusted hosts only. 2. Monitor network traffic and logs for unusual API sync loop activity or unauthorized configuration changes indicative of exploitation attempts. 3. Disable or limit remote access features in RustDesk Client where not strictly necessary to reduce attack surface. 4. Employ endpoint detection and response (EDR) solutions to detect anomalous behavior related to privilege abuse or configuration tampering. 5. Stay informed on official RustDesk advisories and apply patches promptly once released. 6. Conduct regular security audits of remote access tools and configurations to ensure adherence to least privilege principles. 7. Educate users and administrators on the risks of unauthorized remote access and enforce strong authentication and authorization policies where possible. 8. Consider temporary alternative remote access solutions with verified security until a patched RustDesk Client version is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VULSec
Date Reserved
2026-03-05T14:13:35.407Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9ad6c460e1c85dfe7425d

Added to database: 3/5/2026, 4:21:00 PM

Last enriched: 3/5/2026, 4:35:47 PM

Last updated: 3/5/2026, 5:54:59 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses