Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30792: CWE-657 in rustdesk-client RustDesk Client

0
Critical
VulnerabilityCVE-2026-30792cvecve-2026-30792cwe-657
Published: Thu Mar 05 2026 (03/05/2026, 15:14:43 UTC)
Source: CVE Database V5
Vendor/Project: rustdesk-client
Product: RustDesk Client

Description

A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options(). This issue affects RustDesk Client: through 1.4.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/12/2026, 20:38:03 UTC

Technical Analysis

CVE-2026-30792 identifies a critical security vulnerability in the RustDesk Client, a popular open-source remote desktop software, affecting all major platforms including Windows, MacOS, Linux, iOS, Android, and WebClient versions up to 1.4.5. The vulnerability arises from improper handling of Application Programming Interface (API) messages within the client’s synchronization and configuration modules, specifically in the source files src/hbbs_http/sync.Rs and hbb_common/src/config.Rs. The flaw is categorized under CWE-657, which relates to the use of potentially dangerous functions that can lead to security issues. The vulnerability allows an attacker positioned as a Man-in-the-Middle (MitM) to manipulate API messages exchanged between the client and server during strategy synchronization and configuration option setting processes. This manipulation can lead to unauthorized changes in client behavior or configuration, potentially compromising the confidentiality and integrity of the communication and client state. The attack does not require prior authentication or user interaction, increasing the risk of exploitation. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, partial attack traceability, no privileges required, and no user interaction, but with high impact on confidentiality and integrity. Although no known exploits have been reported in the wild, the critical nature of this vulnerability demands immediate attention from users and administrators of RustDesk Client. The vulnerability affects the core functionality of remote desktop sessions, which are widely used for remote administration, support, and collaboration, making it a significant risk vector.

Potential Impact

The impact of CVE-2026-30792 is substantial for organizations relying on RustDesk Client for remote desktop access and collaboration. Successful exploitation allows attackers to intercept and manipulate API messages, potentially altering client configurations or injecting malicious commands without detection. This can lead to unauthorized access, data leakage, session hijacking, or disruption of remote desktop services. Given the cross-platform nature of RustDesk, the vulnerability affects a broad range of environments including enterprise desktops, mobile devices, and web clients. The absence of required authentication or user interaction lowers the barrier for exploitation, increasing the likelihood of attacks in hostile network environments such as public Wi-Fi or compromised internal networks. Organizations in sectors with high remote work adoption, critical infrastructure, or sensitive data handling are particularly at risk. The vulnerability could facilitate lateral movement within networks, espionage, or sabotage, impacting confidentiality and integrity severely. Availability is less directly impacted but could be affected if attackers disrupt synchronization or configuration processes. The lack of known exploits currently provides a window for mitigation before widespread attacks emerge.

Mitigation Recommendations

To mitigate CVE-2026-30792, organizations should first monitor RustDesk Client vendor communications for official patches and apply them promptly once released. Until patches are available, network-level defenses are critical: enforce the use of secure, encrypted communication channels such as VPNs or TLS with strict certificate validation to prevent Man-in-the-Middle attacks. Implement network segmentation and restrict RustDesk traffic to trusted networks. Employ intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous API message patterns or unexpected configuration changes. Encourage users to avoid using RustDesk over untrusted or public networks without additional protections. Review and harden client configuration policies to minimize exposure to manipulated settings. Conduct regular audits of remote desktop sessions and logs to detect suspicious activity. Additionally, consider deploying endpoint security solutions capable of detecting unusual process behavior related to RustDesk. Organizations should also educate users and administrators about the risks of MitM attacks and the importance of secure remote access practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VULSec
Date Reserved
2026-03-05T14:13:37.203Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9a2e4460e1c85dfd87713

Added to database: 3/5/2026, 3:36:04 PM

Last enriched: 3/12/2026, 8:38:03 PM

Last updated: 4/19/2026, 8:04:34 PM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses