Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30793: CWE-285 in rustdesk-client RustDesk Client

0
Critical
VulnerabilityCVE-2026-30793cvecve-2026-30793cwe-285cwe-352
Published: Thu Mar 05 2026 (03/05/2026, 15:21:03 UTC)
Source: CVE Database V5
Vendor/Project: rustdesk-client
Product: RustDesk Client

Description

Cross-Site Request Forgery (CSRF) vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Flutter URI scheme handler, FFI bridge modules) allows Privilege Escalation. This vulnerability is associated with program files flutter/lib/common.Dart, src/flutter_ffi.Rs and program routines URI handler for rustdesk://password/, bind.MainSetPermanentPassword(). This issue affects RustDesk Client: through 1.4.5.

AI-Powered Analysis

AILast updated: 03/05/2026, 15:51:16 UTC

Technical Analysis

CVE-2026-30793 is a critical security vulnerability classified under CWE-285 (Improper Authorization) and CWE-352 (Cross-Site Request Forgery) affecting the RustDesk Client, a popular remote desktop software. The vulnerability exists in the Flutter URI scheme handler and Foreign Function Interface (FFI) bridge modules used by RustDesk Client across multiple operating systems including Windows, MacOS, Linux, iOS, and Android. Specifically, the flaw is in the handling of the rustdesk://password/ URI scheme and the bind.MainSetPermanentPassword() routine, which can be exploited by an attacker to perform unauthorized privilege escalation. Because the vulnerability does not require prior authentication (PR:N) and has low attack complexity (AC:L), an attacker can craft malicious URIs that, when processed by the client, escalate privileges without user consent beyond the initial interaction (UI:P). The vulnerability impacts confidentiality and integrity at a high level (VC:H, VI:H), potentially allowing attackers to gain elevated control over the client system or session. The CVSS 4.0 vector reflects network attack vector (AV:N), no privileges required, and user interaction required, with scope change and high impact on confidentiality and integrity. Although no exploits are currently known in the wild, the critical severity and broad platform coverage necessitate immediate attention. The vulnerability affects all versions of RustDesk Client up to 1.4.5, and no official patches are listed yet, emphasizing the need for proactive mitigation.

Potential Impact

The impact of CVE-2026-30793 is significant for organizations using RustDesk Client for remote desktop access. Successful exploitation can lead to privilege escalation, allowing attackers to gain unauthorized elevated access to client systems. This can compromise sensitive data confidentiality and integrity, potentially enabling lateral movement within networks, unauthorized data exfiltration, or deployment of further malware. Since RustDesk is cross-platform and used in diverse environments, the vulnerability threatens a wide range of endpoints including desktops and mobile devices. The attack requires user interaction but no prior authentication, increasing the risk of social engineering or phishing-based exploitation. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on RustDesk for remote support or access are particularly at risk. The vulnerability could disrupt business operations, lead to data breaches, and damage organizational reputation if exploited.

Mitigation Recommendations

To mitigate CVE-2026-30793, organizations should immediately monitor for official patches or updates from the RustDesk project and apply them as soon as they become available. Until patches are released, implement strict URI handling policies to restrict or disable processing of rustdesk:// URIs from untrusted sources. Employ endpoint protection solutions that can detect and block suspicious URI scheme invocations or abnormal privilege escalation attempts. Educate users about the risks of interacting with unsolicited links or URIs, especially those related to remote desktop software. Network-level controls such as web filtering and email security gateways should be configured to block or flag messages containing malicious rustdesk:// links. Additionally, consider isolating or limiting RustDesk Client usage to trusted networks and users, and monitor logs for unusual activity related to URI handling or privilege changes. Conduct regular security assessments to identify potential exploitation attempts and ensure that least privilege principles are enforced on client systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VULSec
Date Reserved
2026-03-05T14:13:37.203Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9a2e4460e1c85dfd87716

Added to database: 3/5/2026, 3:36:04 PM

Last enriched: 3/5/2026, 3:51:16 PM

Last updated: 3/5/2026, 7:05:45 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses