Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30796: CWE-319 Cleartext Transmission of Sensitive Information in rustdesk-server-pro RustDesk Server Pro

0
High
VulnerabilityCVE-2026-30796cvecve-2026-30796cwe-319
Published: Thu Mar 05 2026 (03/05/2026, 15:30:39 UTC)
Source: CVE Database V5
Vendor/Project: rustdesk-server-pro
Product: RustDesk Server Pro

Description

Cleartext Transmission of Sensitive Information vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Address book sync API modules) allows Sniffing Attacks. This vulnerability is associated with program files Closed source — API endpoint handling heartbeat sync and program routines Heartbeat API handler (accepts preset-address-book-password in plaintext). This issue affects RustDesk Server Pro: through 1.7.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/17/2026, 18:22:21 UTC

Technical Analysis

CVE-2026-30796 is a vulnerability classified under CWE-319 (Cleartext Transmission of Sensitive Information) affecting RustDesk Server Pro, a remote desktop server software used on Windows, MacOS, and Linux platforms. The flaw resides in the address book synchronization API modules, specifically within the Heartbeat API handler, which processes a preset address book password transmitted in plaintext over the network. Because this sensitive credential is not encrypted or protected during transmission, an attacker with network access can perform sniffing attacks to intercept the password. This vulnerability does not require any authentication or user interaction, making it trivially exploitable in environments where network traffic can be monitored or intercepted. The affected versions include all RustDesk Server Pro releases up to 1.7.5. The vulnerability's CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no privileges or user interaction required, and high confidentiality impact. Although no public exploits have been reported yet, the exposure of plaintext passwords can lead to unauthorized access to address book data and potentially broader compromise of remote desktop sessions. The root cause is the lack of encryption or secure transmission protocols for sensitive API parameters, which is a critical security oversight in remote access infrastructure.

Potential Impact

The primary impact of CVE-2026-30796 is the compromise of confidentiality due to interception of plaintext passwords used in the address book synchronization process. Attackers who successfully sniff this data can gain unauthorized access to address book information, potentially exposing contact details and remote access credentials. This can lead to lateral movement within networks, unauthorized remote desktop sessions, and further compromise of organizational assets. Since RustDesk Server Pro is used globally for remote desktop management, organizations relying on it for secure remote access are at risk of data breaches and operational disruption. The vulnerability affects multiple operating systems, increasing the scope of affected environments. The ease of exploitation without authentication or user interaction amplifies the threat, especially in untrusted or poorly segmented networks. While no availability or integrity impacts are directly indicated, the confidentiality breach alone can have severe consequences for privacy, compliance, and security posture.

Mitigation Recommendations

To mitigate CVE-2026-30796, organizations should immediately upgrade RustDesk Server Pro to a patched version once released by the vendor that addresses the cleartext transmission issue. Until patches are available, network administrators should enforce encryption at the network layer, such as deploying VPNs or TLS tunnels to protect API traffic. Implementing strict network segmentation and monitoring for unusual traffic patterns can reduce exposure to sniffing attacks. Disabling or restricting the address book sync API modules where feasible can limit attack surface. Additionally, organizations should audit and rotate any potentially exposed credentials and enforce strong password policies. Employing intrusion detection systems capable of identifying plaintext credential transmission may help detect exploitation attempts. Finally, vendors should be engaged to prioritize secure coding practices, including encrypting all sensitive data in transit and performing thorough security testing of remote access components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VULSec
Date Reserved
2026-03-05T14:13:37.203Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9c05f460e1c85df0c5c57

Added to database: 3/5/2026, 5:41:51 PM

Last enriched: 3/17/2026, 6:22:21 PM

Last updated: 4/19/2026, 8:14:31 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses