Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30796: CWE-319 Cleartext Transmission of Sensitive Information in rustdesk-server-pro RustDesk Server Pro

0
High
VulnerabilityCVE-2026-30796cvecve-2026-30796cwe-319
Published: Thu Mar 05 2026 (03/05/2026, 15:30:39 UTC)
Source: CVE Database V5
Vendor/Project: rustdesk-server-pro
Product: RustDesk Server Pro

Description

Cleartext Transmission of Sensitive Information vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Address book sync API modules) allows Sniffing Attacks. This vulnerability is associated with program files Closed source — API endpoint handling heartbeat sync and program routines Heartbeat API handler (accepts preset-address-book-password in plaintext). This issue affects RustDesk Server Pro: through 1.7.5.

AI-Powered Analysis

AILast updated: 03/05/2026, 17:50:41 UTC

Technical Analysis

CVE-2026-30796 is a vulnerability classified under CWE-319 (Cleartext Transmission of Sensitive Information) found in RustDesk Server Pro, a remote desktop server software used on Windows, MacOS, and Linux platforms. The issue resides in the address book synchronization API modules, specifically within the Heartbeat API handler, which accepts a preset address book password transmitted in plaintext. This insecure transmission enables network attackers to perform sniffing attacks, intercepting sensitive credentials without requiring authentication or user interaction. The vulnerability affects all versions of RustDesk Server Pro up to and including 1.7.5. The flaw arises because the API endpoint handling heartbeat sync does not enforce encryption or secure transport mechanisms, exposing sensitive data during network communication. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and a high impact on confidentiality (VC:H). No known public exploits have been reported yet, but the potential for credential interception poses a significant risk to organizations relying on RustDesk Server Pro for remote access and management. The vulnerability's presence across multiple operating systems increases its attack surface and potential impact.

Potential Impact

The primary impact of CVE-2026-30796 is the compromise of confidentiality due to the interception of sensitive information, specifically the preset address book password used in RustDesk Server Pro. An attacker capable of sniffing network traffic can obtain these credentials, potentially enabling unauthorized access to remote desktop sessions or further lateral movement within an organization's network. This can lead to data breaches, unauthorized system control, and exposure of internal resources. Since RustDesk Server Pro is used for remote desktop management, exploitation could undermine trust in remote access infrastructure, disrupt business continuity, and facilitate further attacks such as ransomware or espionage. The vulnerability affects multiple operating systems, broadening the scope of affected environments globally. Organizations without encrypted communication or network segmentation are particularly vulnerable. The lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the likelihood of successful attacks in untrusted or public network environments.

Mitigation Recommendations

To mitigate CVE-2026-30796, organizations should immediately enforce encrypted communication channels for all RustDesk Server Pro traffic, such as deploying TLS/SSL for the heartbeat sync API endpoints to prevent plaintext transmission of sensitive data. Network administrators should configure firewalls and intrusion detection systems to monitor and restrict unauthorized access to RustDesk Server Pro servers, especially on untrusted networks. Employing VPNs or secure tunnels for remote desktop traffic can further reduce exposure. Organizations should audit their RustDesk Server Pro deployments to identify versions up to 1.7.5 and plan prompt upgrades once patches are released by the vendor. Until patches are available, disabling or restricting the address book sync feature or the heartbeat API handler may reduce risk. Regularly monitoring network traffic for unusual patterns or unauthorized access attempts can help detect exploitation attempts early. Additionally, educating users and administrators about the risks of transmitting sensitive credentials in plaintext and enforcing strong password policies will enhance overall security posture.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VULSec
Date Reserved
2026-03-05T14:13:37.203Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9c05f460e1c85df0c5c57

Added to database: 3/5/2026, 5:41:51 PM

Last enriched: 3/5/2026, 5:50:41 PM

Last updated: 3/5/2026, 7:06:03 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses