CVE-2026-30793: CWE-285 in rustdesk-client RustDesk Client
Cross-Site Request Forgery (CSRF) vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Flutter URI scheme handler, FFI bridge modules) allows Privilege Escalation. This vulnerability is associated with program files flutter/lib/common.Dart, src/flutter_ffi.Rs and program routines URI handler for rustdesk://password/, bind.MainSetPermanentPassword(). This issue affects RustDesk Client: through 1.4.5.
AI Analysis
Technical Summary
CVE-2026-30793 is a critical security vulnerability classified under CWE-285 (Improper Authorization) and CWE-352 (Cross-Site Request Forgery) affecting the RustDesk Client, a popular remote desktop software. The vulnerability exists in the Flutter URI scheme handler and Foreign Function Interface (FFI) bridge modules used by RustDesk Client across multiple operating systems including Windows, MacOS, Linux, iOS, and Android. Specifically, the flaw is in the handling of the rustdesk://password/ URI scheme and the bind.MainSetPermanentPassword() routine, which can be exploited by an attacker to perform unauthorized privilege escalation. Because the vulnerability does not require prior authentication (PR:N) and has low attack complexity (AC:L), an attacker can craft malicious URIs that, when processed by the client, escalate privileges without user consent beyond the initial interaction (UI:P). The vulnerability impacts confidentiality and integrity at a high level (VC:H, VI:H), potentially allowing attackers to gain elevated control over the client system or session. The CVSS 4.0 vector reflects network attack vector (AV:N), no privileges required, and user interaction required, with scope change and high impact on confidentiality and integrity. Although no exploits are currently known in the wild, the critical severity and broad platform coverage necessitate immediate attention. The vulnerability affects all versions of RustDesk Client up to 1.4.5, and no official patches are listed yet, emphasizing the need for proactive mitigation.
Potential Impact
The impact of CVE-2026-30793 is significant for organizations using RustDesk Client for remote desktop access. Successful exploitation can lead to privilege escalation, allowing attackers to gain unauthorized elevated access to client systems. This can compromise sensitive data confidentiality and integrity, potentially enabling lateral movement within networks, unauthorized data exfiltration, or deployment of further malware. Since RustDesk is cross-platform and used in diverse environments, the vulnerability threatens a wide range of endpoints including desktops and mobile devices. The attack requires user interaction but no prior authentication, increasing the risk of social engineering or phishing-based exploitation. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on RustDesk for remote support or access are particularly at risk. The vulnerability could disrupt business operations, lead to data breaches, and damage organizational reputation if exploited.
Mitigation Recommendations
To mitigate CVE-2026-30793, organizations should immediately monitor for official patches or updates from the RustDesk project and apply them as soon as they become available. Until patches are released, implement strict URI handling policies to restrict or disable processing of rustdesk:// URIs from untrusted sources. Employ endpoint protection solutions that can detect and block suspicious URI scheme invocations or abnormal privilege escalation attempts. Educate users about the risks of interacting with unsolicited links or URIs, especially those related to remote desktop software. Network-level controls such as web filtering and email security gateways should be configured to block or flag messages containing malicious rustdesk:// links. Additionally, consider isolating or limiting RustDesk Client usage to trusted networks and users, and monitor logs for unusual activity related to URI handling or privilege changes. Conduct regular security assessments to identify potential exploitation attempts and ensure that least privilege principles are enforced on client systems.
Affected Countries
United States, Germany, China, India, United Kingdom, Canada, Australia, France, Japan, South Korea
CVE-2026-30793: CWE-285 in rustdesk-client RustDesk Client
Description
Cross-Site Request Forgery (CSRF) vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Flutter URI scheme handler, FFI bridge modules) allows Privilege Escalation. This vulnerability is associated with program files flutter/lib/common.Dart, src/flutter_ffi.Rs and program routines URI handler for rustdesk://password/, bind.MainSetPermanentPassword(). This issue affects RustDesk Client: through 1.4.5.
AI-Powered Analysis
Technical Analysis
CVE-2026-30793 is a critical security vulnerability classified under CWE-285 (Improper Authorization) and CWE-352 (Cross-Site Request Forgery) affecting the RustDesk Client, a popular remote desktop software. The vulnerability exists in the Flutter URI scheme handler and Foreign Function Interface (FFI) bridge modules used by RustDesk Client across multiple operating systems including Windows, MacOS, Linux, iOS, and Android. Specifically, the flaw is in the handling of the rustdesk://password/ URI scheme and the bind.MainSetPermanentPassword() routine, which can be exploited by an attacker to perform unauthorized privilege escalation. Because the vulnerability does not require prior authentication (PR:N) and has low attack complexity (AC:L), an attacker can craft malicious URIs that, when processed by the client, escalate privileges without user consent beyond the initial interaction (UI:P). The vulnerability impacts confidentiality and integrity at a high level (VC:H, VI:H), potentially allowing attackers to gain elevated control over the client system or session. The CVSS 4.0 vector reflects network attack vector (AV:N), no privileges required, and user interaction required, with scope change and high impact on confidentiality and integrity. Although no exploits are currently known in the wild, the critical severity and broad platform coverage necessitate immediate attention. The vulnerability affects all versions of RustDesk Client up to 1.4.5, and no official patches are listed yet, emphasizing the need for proactive mitigation.
Potential Impact
The impact of CVE-2026-30793 is significant for organizations using RustDesk Client for remote desktop access. Successful exploitation can lead to privilege escalation, allowing attackers to gain unauthorized elevated access to client systems. This can compromise sensitive data confidentiality and integrity, potentially enabling lateral movement within networks, unauthorized data exfiltration, or deployment of further malware. Since RustDesk is cross-platform and used in diverse environments, the vulnerability threatens a wide range of endpoints including desktops and mobile devices. The attack requires user interaction but no prior authentication, increasing the risk of social engineering or phishing-based exploitation. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on RustDesk for remote support or access are particularly at risk. The vulnerability could disrupt business operations, lead to data breaches, and damage organizational reputation if exploited.
Mitigation Recommendations
To mitigate CVE-2026-30793, organizations should immediately monitor for official patches or updates from the RustDesk project and apply them as soon as they become available. Until patches are released, implement strict URI handling policies to restrict or disable processing of rustdesk:// URIs from untrusted sources. Employ endpoint protection solutions that can detect and block suspicious URI scheme invocations or abnormal privilege escalation attempts. Educate users about the risks of interacting with unsolicited links or URIs, especially those related to remote desktop software. Network-level controls such as web filtering and email security gateways should be configured to block or flag messages containing malicious rustdesk:// links. Additionally, consider isolating or limiting RustDesk Client usage to trusted networks and users, and monitor logs for unusual activity related to URI handling or privilege changes. Conduct regular security assessments to identify potential exploitation attempts and ensure that least privilege principles are enforced on client systems.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VULSec
- Date Reserved
- 2026-03-05T14:13:37.203Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a9a2e4460e1c85dfd87716
Added to database: 3/5/2026, 3:36:04 PM
Last enriched: 3/5/2026, 3:51:16 PM
Last updated: 3/5/2026, 7:05:45 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3459: CWE-434 Unrestricted Upload of File with Dangerous Type in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
HighCVE-2026-3047: Authentication Bypass by Primary Weakness in Red Hat Red Hat Build of Keycloak
HighCVE-2026-3009: Improper Authorization in Red Hat Red Hat Build of Keycloak
HighCVE-2026-28287: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in FreePBX security-reporting
HighCVE-2026-28284: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.