Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30791: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in rustdesk-client RustDesk Client

0
High
VulnerabilityCVE-2026-30791cvecve-2026-30791cwe-327cwe-684
Published: Thu Mar 05 2026 (03/05/2026, 14:47:56 UTC)
Source: CVE Database V5
Vendor/Project: rustdesk-client
Product: RustDesk Client

Description

Use of a Broken or Risky Cryptographic Algorithm vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Config import, URI scheme handler, CLI --config modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files flutter/lib/common.Dart, hbb_common/src/config.Rs and program routines parseRustdeskUri(), importConfig(). This issue affects RustDesk Client: through 1.4.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/12/2026, 20:24:43 UTC

Technical Analysis

CVE-2026-30791 identifies a vulnerability in the RustDesk Client, a remote desktop software, caused by the use of broken or risky cryptographic algorithms (CWE-327) combined with potential resource exhaustion or memory corruption issues (CWE-684). The affected versions up to 1.4.5 span multiple platforms including Windows, MacOS, Linux, iOS, Android, and WebClient. The vulnerability resides in the handling of configuration import and URI scheme processing modules, specifically within the parseRustdeskUri() and importConfig() functions. These components utilize cryptographic methods that are considered insecure or deprecated, leading to the possibility of attackers retrieving embedded sensitive data such as configuration secrets or credentials. The vulnerability requires no privileges or user interaction and is exploitable remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is high on confidentiality, with no direct effect on integrity or availability. The flaw is present in key source files flutter/lib/common.Dart and hbb_common/src/config.Rs, suggesting a cross-language implementation issue. Although no public exploits are currently known, the vulnerability poses a significant risk due to the critical nature of the data exposed and the ease of exploitation. The lack of patches at the time of reporting necessitates immediate attention from RustDesk users and developers to remediate or mitigate the issue.

Potential Impact

The primary impact of CVE-2026-30791 is the unauthorized disclosure of embedded sensitive data within the RustDesk Client application. This can lead to compromise of user credentials, configuration secrets, or other confidential information that attackers can leverage to gain unauthorized access to remote desktop sessions or escalate privileges. Since the vulnerability is exploitable remotely without authentication or user interaction, it significantly increases the attack surface for threat actors. Organizations relying on RustDesk for remote access may face data breaches, unauthorized system access, and potential lateral movement within their networks. The exposure of sensitive configuration data could also facilitate further attacks such as man-in-the-middle, session hijacking, or persistent access. Given RustDesk’s cross-platform presence, the impact spans diverse environments including enterprise desktops, mobile devices, and web clients, amplifying the risk. The vulnerability undermines trust in the cryptographic protections of the client, potentially affecting compliance with data protection regulations and increasing liability. Although no active exploitation is reported, the high CVSS score reflects the critical nature of the threat if weaponized.

Mitigation Recommendations

1. Immediate mitigation involves disabling or restricting the use of the vulnerable configuration import and URI scheme features until patches are released. 2. Monitor RustDesk official channels for security updates and apply patches promptly once available. 3. Implement network-level controls such as firewall rules or intrusion detection systems to limit exposure of RustDesk client services to untrusted networks. 4. Conduct thorough audits of existing RustDesk configurations to identify and remove embedded sensitive data where feasible. 5. Employ application-layer encryption or VPN tunnels to add an additional layer of protection around remote desktop communications. 6. Educate users on the risks of importing untrusted configuration files or clicking on suspicious URI schemes related to RustDesk. 7. Consider alternative remote desktop solutions with stronger cryptographic assurances if immediate patching is not possible. 8. Use endpoint detection and response (EDR) tools to detect anomalous activities that may indicate exploitation attempts. 9. Review and tighten access controls and authentication mechanisms around remote desktop infrastructure to limit potential damage from data exposure. 10. Engage in threat hunting and log analysis to detect any signs of exploitation attempts targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VULSec
Date Reserved
2026-03-05T14:13:37.203Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a99d83d9f976b5b5c65c44

Added to database: 3/5/2026, 3:13:07 PM

Last enriched: 3/12/2026, 8:24:43 PM

Last updated: 4/19/2026, 9:28:23 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses