CVE-2026-30789: CWE-294 Authentication Bypass by Capture-replay in rustdesk-client RustDesk Client
Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
AI Analysis
Technical Summary
CVE-2026-30789 is a critical vulnerability in the RustDesk Client, a popular remote desktop software used across multiple platforms including Windows, macOS, Linux, iOS, and Android. The flaw stems from an authentication bypass caused by capture-replay attacks, where attackers can reuse valid session IDs to gain unauthorized access. This is facilitated by the client’s use of password hashes with insufficient computational effort, making it easier to compromise authentication tokens. Specifically, the vulnerability involves the client’s login proof construction and the hash_password() routine, which do not adequately protect against replaying previously captured authentication data. The vulnerability affects all versions of RustDesk Client up to 1.4.5. Exploitation requires no user interaction, privileges, or authentication, and can be performed remotely over the network. This allows attackers to impersonate legitimate users, potentially gaining full access to remote desktop sessions and sensitive data. The CVSS 4.0 base score of 9.3 reflects the critical nature of this issue, highlighting high impact on confidentiality and integrity with no required attack complexity or privileges. Although no public exploits are reported yet, the vulnerability poses a significant risk to organizations using RustDesk for remote access, especially in environments where secure authentication is critical. The lack of patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
The impact of CVE-2026-30789 is severe for organizations worldwide that use RustDesk Client for remote desktop access. Successful exploitation allows attackers to bypass authentication entirely by replaying captured session IDs, granting unauthorized access to remote systems. This can lead to data breaches, unauthorized control over critical infrastructure, lateral movement within networks, and potential deployment of malware or ransomware. Confidentiality is compromised as attackers can view sensitive information during remote sessions. Integrity is at risk because attackers can manipulate or alter data and system configurations. Availability could also be indirectly affected if attackers disrupt remote access services or deploy destructive payloads. The vulnerability’s ease of exploitation without any authentication or user interaction increases the likelihood of attacks, especially in environments with exposed RustDesk services. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their remote access needs. The widespread multi-platform support of RustDesk expands the attack surface, affecting diverse environments and increasing the global risk profile.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations to reduce risk. First, restrict RustDesk Client network access using firewalls or VPNs to trusted IP addresses only, minimizing exposure to untrusted networks. Enable network-level intrusion detection and prevention systems (IDS/IPS) to monitor for replay attack patterns or unusual session reuse. Employ multi-factor authentication (MFA) at the network or gateway level to add an additional layer of verification beyond the vulnerable client authentication. Regularly audit and monitor remote access logs for suspicious session activity or repeated session IDs. Consider temporarily disabling RustDesk Client usage in high-risk environments or replacing it with alternative remote access solutions with stronger authentication until patches are available. Educate users about the risk of session replay and encourage secure handling of session tokens. Once patches are released, prioritize immediate deployment across all affected platforms. Additionally, developers should review and enhance the client’s authentication mechanisms by implementing stronger password hashing algorithms with sufficient computational effort and incorporating anti-replay protections such as nonce or timestamp validation in session tokens.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, Canada, France, Australia, Netherlands, Sweden, Singapore
CVE-2026-30789: CWE-294 Authentication Bypass by Capture-replay in rustdesk-client RustDesk Client
Description
Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
AI-Powered Analysis
Technical Analysis
CVE-2026-30789 is a critical vulnerability in the RustDesk Client, a popular remote desktop software used across multiple platforms including Windows, macOS, Linux, iOS, and Android. The flaw stems from an authentication bypass caused by capture-replay attacks, where attackers can reuse valid session IDs to gain unauthorized access. This is facilitated by the client’s use of password hashes with insufficient computational effort, making it easier to compromise authentication tokens. Specifically, the vulnerability involves the client’s login proof construction and the hash_password() routine, which do not adequately protect against replaying previously captured authentication data. The vulnerability affects all versions of RustDesk Client up to 1.4.5. Exploitation requires no user interaction, privileges, or authentication, and can be performed remotely over the network. This allows attackers to impersonate legitimate users, potentially gaining full access to remote desktop sessions and sensitive data. The CVSS 4.0 base score of 9.3 reflects the critical nature of this issue, highlighting high impact on confidentiality and integrity with no required attack complexity or privileges. Although no public exploits are reported yet, the vulnerability poses a significant risk to organizations using RustDesk for remote access, especially in environments where secure authentication is critical. The lack of patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
The impact of CVE-2026-30789 is severe for organizations worldwide that use RustDesk Client for remote desktop access. Successful exploitation allows attackers to bypass authentication entirely by replaying captured session IDs, granting unauthorized access to remote systems. This can lead to data breaches, unauthorized control over critical infrastructure, lateral movement within networks, and potential deployment of malware or ransomware. Confidentiality is compromised as attackers can view sensitive information during remote sessions. Integrity is at risk because attackers can manipulate or alter data and system configurations. Availability could also be indirectly affected if attackers disrupt remote access services or deploy destructive payloads. The vulnerability’s ease of exploitation without any authentication or user interaction increases the likelihood of attacks, especially in environments with exposed RustDesk services. Organizations in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their remote access needs. The widespread multi-platform support of RustDesk expands the attack surface, affecting diverse environments and increasing the global risk profile.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations to reduce risk. First, restrict RustDesk Client network access using firewalls or VPNs to trusted IP addresses only, minimizing exposure to untrusted networks. Enable network-level intrusion detection and prevention systems (IDS/IPS) to monitor for replay attack patterns or unusual session reuse. Employ multi-factor authentication (MFA) at the network or gateway level to add an additional layer of verification beyond the vulnerable client authentication. Regularly audit and monitor remote access logs for suspicious session activity or repeated session IDs. Consider temporarily disabling RustDesk Client usage in high-risk environments or replacing it with alternative remote access solutions with stronger authentication until patches are available. Educate users about the risk of session replay and encourage secure handling of session tokens. Once patches are released, prioritize immediate deployment across all affected platforms. Additionally, developers should review and enhance the client’s authentication mechanisms by implementing stronger password hashing algorithms with sufficient computational effort and incorporating anti-replay protections such as nonce or timestamp validation in session tokens.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VULSec
- Date Reserved
- 2026-03-05T14:13:37.202Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a9c05f460e1c85df0c5c51
Added to database: 3/5/2026, 5:41:51 PM
Last enriched: 3/5/2026, 5:51:17 PM
Last updated: 3/5/2026, 7:05:45 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3459: CWE-434 Unrestricted Upload of File with Dangerous Type in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
HighCVE-2026-3047: Authentication Bypass by Primary Weakness in Red Hat Red Hat Build of Keycloak
HighCVE-2026-3009: Improper Authorization in Red Hat Red Hat Build of Keycloak
HighCVE-2026-28287: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in FreePBX security-reporting
HighCVE-2026-28284: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.