Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30785: CWE-257 in rustdesk-client RustDesk Client

0
High
Published: Thu Mar 05 2026 (03/05/2026, 16:04:36 UTC)
Source: CVE Database V5
Vendor/Project: rustdesk-client
Product: RustDesk Client

Description

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id(). This issue affects RustDesk Client: through 1.4.5.

AI-Powered Analysis

AILast updated: 03/05/2026, 16:35:20 UTC

Technical Analysis

CVE-2026-30785 is a vulnerability in RustDesk Client, a remote desktop software, affecting versions through 1.4.5 on Windows, macOS, and Linux platforms. The flaw arises from a combination of improper prototype pollution and weak password hashing mechanisms within critical components such as password_security.Rs, config.Rs, lib.Rs, and machine-uid modules. Prototype pollution (CWE-916) allows attackers to manipulate object prototype attributes, potentially altering program behavior or bypassing security checks. Additionally, the use of password hashes with insufficient computational effort (CWE-323) weakens the protection of stored credentials and encrypted configurations. The affected routines include symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), and get_machine_id(), which handle encryption and unique machine identification. This vulnerability enables attackers with low privileges and local access to retrieve embedded sensitive data such as passwords, configuration secrets, or machine identifiers, compromising confidentiality. The CVSS 4.0 score is 8.2 (high severity), reflecting the local attack vector with low complexity but high impact on confidentiality and scope limited to the vulnerable client. No authentication or user interaction is required, but physical or local system access is necessary. No patches are currently linked, and no known exploits have been reported in the wild as of publication.

Potential Impact

The vulnerability poses a significant risk to organizations relying on RustDesk Client for remote desktop access and collaboration. Attackers with local access can exploit the flaw to extract sensitive credentials, configuration secrets, and machine identifiers, potentially leading to unauthorized access, lateral movement, or persistent compromise within corporate networks. The exposure of machine unique IDs can facilitate device impersonation or tracking. Since RustDesk is cross-platform and used globally, the impact spans multiple operating systems and environments. Confidentiality breaches may lead to data leakage, compliance violations, and erosion of trust. Although exploitation requires local access, in environments where endpoint security is weak or insider threats exist, the risk is elevated. The lack of user interaction and low attack complexity further increase the threat level. Organizations may face operational disruptions if attackers leverage stolen credentials or configuration data to escalate privileges or disrupt remote access services.

Mitigation Recommendations

Organizations should monitor RustDesk Client usage and restrict its installation to trusted users and devices. Until an official patch is released, consider the following mitigations: (1) Limit local user privileges to reduce the risk of exploitation; (2) Employ endpoint detection and response (EDR) solutions to detect anomalous access or manipulation of RustDesk files and processes; (3) Encrypt sensitive configuration files and credentials using stronger, computationally intensive hashing algorithms outside of RustDesk's vulnerable modules; (4) Regularly audit and rotate credentials and machine identifiers used by RustDesk; (5) Implement strict access controls and network segmentation to minimize the impact of compromised endpoints; (6) Educate users about the risks of local exploitation and enforce strong endpoint security hygiene; (7) Monitor for updates from RustDesk and apply patches promptly once available; (8) Consider alternative remote desktop solutions if immediate mitigation is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VULSec
Date Reserved
2026-03-05T14:13:35.407Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9ad6c460e1c85dfe74263

Added to database: 3/5/2026, 4:21:00 PM

Last enriched: 3/5/2026, 4:35:20 PM

Last updated: 3/5/2026, 5:47:54 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses