CVE-2026-30792: CWE-657 in rustdesk-client RustDesk Client
A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options(). This issue affects RustDesk Client: through 1.4.5.
AI Analysis
Technical Summary
CVE-2026-30792 identifies a critical security vulnerability in the RustDesk Client, a popular open-source remote desktop software, affecting all major platforms including Windows, MacOS, Linux, iOS, Android, and WebClient versions up to 1.4.5. The vulnerability arises from improper handling of Application Programming Interface (API) messages within the client’s synchronization and configuration modules, specifically in the source files src/hbbs_http/sync.Rs and hbb_common/src/config.Rs. The flaw is categorized under CWE-657, which relates to the use of potentially dangerous functions that can lead to security issues. The vulnerability allows an attacker positioned as a Man-in-the-Middle (MitM) to manipulate API messages exchanged between the client and server during strategy synchronization and configuration option setting processes. This manipulation can lead to unauthorized changes in client behavior or configuration, potentially compromising the confidentiality and integrity of the communication and client state. The attack does not require prior authentication or user interaction, increasing the risk of exploitation. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, partial attack traceability, no privileges required, and no user interaction, but with high impact on confidentiality and integrity. Although no known exploits have been reported in the wild, the critical nature of this vulnerability demands immediate attention from users and administrators of RustDesk Client. The vulnerability affects the core functionality of remote desktop sessions, which are widely used for remote administration, support, and collaboration, making it a significant risk vector.
Potential Impact
The impact of CVE-2026-30792 is substantial for organizations relying on RustDesk Client for remote desktop access and collaboration. Successful exploitation allows attackers to intercept and manipulate API messages, potentially altering client configurations or injecting malicious commands without detection. This can lead to unauthorized access, data leakage, session hijacking, or disruption of remote desktop services. Given the cross-platform nature of RustDesk, the vulnerability affects a broad range of environments including enterprise desktops, mobile devices, and web clients. The absence of required authentication or user interaction lowers the barrier for exploitation, increasing the likelihood of attacks in hostile network environments such as public Wi-Fi or compromised internal networks. Organizations in sectors with high remote work adoption, critical infrastructure, or sensitive data handling are particularly at risk. The vulnerability could facilitate lateral movement within networks, espionage, or sabotage, impacting confidentiality and integrity severely. Availability is less directly impacted but could be affected if attackers disrupt synchronization or configuration processes. The lack of known exploits currently provides a window for mitigation before widespread attacks emerge.
Mitigation Recommendations
To mitigate CVE-2026-30792, organizations should first monitor RustDesk Client vendor communications for official patches and apply them promptly once released. Until patches are available, network-level defenses are critical: enforce the use of secure, encrypted communication channels such as VPNs or TLS with strict certificate validation to prevent Man-in-the-Middle attacks. Implement network segmentation and restrict RustDesk traffic to trusted networks. Employ intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous API message patterns or unexpected configuration changes. Encourage users to avoid using RustDesk over untrusted or public networks without additional protections. Review and harden client configuration policies to minimize exposure to manipulated settings. Conduct regular audits of remote desktop sessions and logs to detect suspicious activity. Additionally, consider deploying endpoint security solutions capable of detecting unusual process behavior related to RustDesk. Organizations should also educate users and administrators about the risks of MitM attacks and the importance of secure remote access practices.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Brazil, Netherlands, Sweden, Singapore
CVE-2026-30792: CWE-657 in rustdesk-client RustDesk Client
Description
A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options(). This issue affects RustDesk Client: through 1.4.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-30792 identifies a critical security vulnerability in the RustDesk Client, a popular open-source remote desktop software, affecting all major platforms including Windows, MacOS, Linux, iOS, Android, and WebClient versions up to 1.4.5. The vulnerability arises from improper handling of Application Programming Interface (API) messages within the client’s synchronization and configuration modules, specifically in the source files src/hbbs_http/sync.Rs and hbb_common/src/config.Rs. The flaw is categorized under CWE-657, which relates to the use of potentially dangerous functions that can lead to security issues. The vulnerability allows an attacker positioned as a Man-in-the-Middle (MitM) to manipulate API messages exchanged between the client and server during strategy synchronization and configuration option setting processes. This manipulation can lead to unauthorized changes in client behavior or configuration, potentially compromising the confidentiality and integrity of the communication and client state. The attack does not require prior authentication or user interaction, increasing the risk of exploitation. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, partial attack traceability, no privileges required, and no user interaction, but with high impact on confidentiality and integrity. Although no known exploits have been reported in the wild, the critical nature of this vulnerability demands immediate attention from users and administrators of RustDesk Client. The vulnerability affects the core functionality of remote desktop sessions, which are widely used for remote administration, support, and collaboration, making it a significant risk vector.
Potential Impact
The impact of CVE-2026-30792 is substantial for organizations relying on RustDesk Client for remote desktop access and collaboration. Successful exploitation allows attackers to intercept and manipulate API messages, potentially altering client configurations or injecting malicious commands without detection. This can lead to unauthorized access, data leakage, session hijacking, or disruption of remote desktop services. Given the cross-platform nature of RustDesk, the vulnerability affects a broad range of environments including enterprise desktops, mobile devices, and web clients. The absence of required authentication or user interaction lowers the barrier for exploitation, increasing the likelihood of attacks in hostile network environments such as public Wi-Fi or compromised internal networks. Organizations in sectors with high remote work adoption, critical infrastructure, or sensitive data handling are particularly at risk. The vulnerability could facilitate lateral movement within networks, espionage, or sabotage, impacting confidentiality and integrity severely. Availability is less directly impacted but could be affected if attackers disrupt synchronization or configuration processes. The lack of known exploits currently provides a window for mitigation before widespread attacks emerge.
Mitigation Recommendations
To mitigate CVE-2026-30792, organizations should first monitor RustDesk Client vendor communications for official patches and apply them promptly once released. Until patches are available, network-level defenses are critical: enforce the use of secure, encrypted communication channels such as VPNs or TLS with strict certificate validation to prevent Man-in-the-Middle attacks. Implement network segmentation and restrict RustDesk traffic to trusted networks. Employ intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous API message patterns or unexpected configuration changes. Encourage users to avoid using RustDesk over untrusted or public networks without additional protections. Review and harden client configuration policies to minimize exposure to manipulated settings. Conduct regular audits of remote desktop sessions and logs to detect suspicious activity. Additionally, consider deploying endpoint security solutions capable of detecting unusual process behavior related to RustDesk. Organizations should also educate users and administrators about the risks of MitM attacks and the importance of secure remote access practices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VULSec
- Date Reserved
- 2026-03-05T14:13:37.203Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a9a2e4460e1c85dfd87713
Added to database: 3/5/2026, 3:36:04 PM
Last enriched: 3/12/2026, 8:38:03 PM
Last updated: 4/19/2026, 8:04:34 PM
Views: 129
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.