CVE-2026-30797: CWE-862 Missing Authorization in rustdesk-client RustDesk Client
Missing Authorization vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Flutter URI scheme handler, config import modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files flutter/lib/common.Dart and program routines importConfig() via URI handler. This issue affects RustDesk Client: through 1.4.5.
AI Analysis
Technical Summary
CVE-2026-30797 is a critical security vulnerability identified in the RustDesk Client, a remote desktop software available on multiple platforms including Windows, MacOS, Linux, iOS, and Android. The flaw is categorized under CWE-862 (Missing Authorization) and CWE-749 (Exposed Dangerous Method or Function). It specifically affects the Flutter URI scheme handler and configuration import modules, notably the importConfig() function within the flutter/lib/common.Dart file. The vulnerability allows an attacker positioned as a man-in-the-middle (MitM) to intercept and manipulate API messages exchanged by the RustDesk Client application. Due to missing authorization checks, the attacker can craft malicious URI requests that the client processes without verifying the legitimacy or permissions of the source. This can lead to unauthorized configuration changes or injection of malicious settings, potentially compromising the confidentiality and integrity of the remote desktop sessions. The vulnerability requires no prior authentication or privileges but does require user interaction, such as clicking a malicious URI link. The CVSS 4.0 base score of 9.3 indicates a critical severity with network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality and integrity. Although no known exploits are currently reported in the wild, the broad platform support and the nature of the vulnerability make it a significant risk for users of RustDesk Client up to version 1.4.5. The absence of available patches at the time of disclosure necessitates immediate attention to mitigation strategies to prevent exploitation.
Potential Impact
The impact of CVE-2026-30797 on organizations worldwide can be severe. RustDesk Client is used for remote desktop access and support, often in enterprise environments. Exploitation could allow attackers to manipulate configuration settings or inject malicious commands, potentially leading to unauthorized access, data leakage, or disruption of remote sessions. Confidentiality is at high risk as attackers can intercept and alter sensitive session data. Integrity is compromised because unauthorized configuration changes can alter the behavior of the client or the remote connection. Availability impact is lower but possible if malicious configurations disrupt service. Since the vulnerability requires no authentication and can be exploited remotely via MitM attacks, attackers can target users on insecure networks or those tricked into clicking malicious URIs. This threat is especially critical for organizations relying on RustDesk for secure remote access, including IT support teams, managed service providers, and remote workers. Without timely mitigation, attackers could leverage this vulnerability to gain footholds in corporate networks or exfiltrate sensitive information.
Mitigation Recommendations
To mitigate CVE-2026-30797, organizations should take the following specific actions: 1) Monitor RustDesk Client vendor announcements closely and apply security patches immediately once released. 2) Until patches are available, restrict RustDesk Client usage to trusted networks with strong encryption and avoid use over public or untrusted Wi-Fi to reduce MitM attack risk. 3) Employ network-level protections such as TLS interception detection, DNS filtering, and network segmentation to limit exposure. 4) Educate users to avoid clicking on untrusted or unsolicited URI links that could trigger the vulnerable importConfig() functionality. 5) Implement endpoint detection and response (EDR) solutions to monitor for suspicious RustDesk client behavior or unauthorized configuration changes. 6) Consider using alternative remote desktop solutions with verified secure authorization mechanisms if immediate patching is not feasible. 7) Conduct regular audits of remote access configurations and logs to detect anomalies potentially related to exploitation attempts. These targeted measures go beyond generic advice by focusing on mitigating the specific attack vector (Flutter URI scheme handler) and the man-in-the-middle exploitation method.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Brazil
CVE-2026-30797: CWE-862 Missing Authorization in rustdesk-client RustDesk Client
Description
Missing Authorization vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Flutter URI scheme handler, config import modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files flutter/lib/common.Dart and program routines importConfig() via URI handler. This issue affects RustDesk Client: through 1.4.5.
AI-Powered Analysis
Technical Analysis
CVE-2026-30797 is a critical security vulnerability identified in the RustDesk Client, a remote desktop software available on multiple platforms including Windows, MacOS, Linux, iOS, and Android. The flaw is categorized under CWE-862 (Missing Authorization) and CWE-749 (Exposed Dangerous Method or Function). It specifically affects the Flutter URI scheme handler and configuration import modules, notably the importConfig() function within the flutter/lib/common.Dart file. The vulnerability allows an attacker positioned as a man-in-the-middle (MitM) to intercept and manipulate API messages exchanged by the RustDesk Client application. Due to missing authorization checks, the attacker can craft malicious URI requests that the client processes without verifying the legitimacy or permissions of the source. This can lead to unauthorized configuration changes or injection of malicious settings, potentially compromising the confidentiality and integrity of the remote desktop sessions. The vulnerability requires no prior authentication or privileges but does require user interaction, such as clicking a malicious URI link. The CVSS 4.0 base score of 9.3 indicates a critical severity with network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality and integrity. Although no known exploits are currently reported in the wild, the broad platform support and the nature of the vulnerability make it a significant risk for users of RustDesk Client up to version 1.4.5. The absence of available patches at the time of disclosure necessitates immediate attention to mitigation strategies to prevent exploitation.
Potential Impact
The impact of CVE-2026-30797 on organizations worldwide can be severe. RustDesk Client is used for remote desktop access and support, often in enterprise environments. Exploitation could allow attackers to manipulate configuration settings or inject malicious commands, potentially leading to unauthorized access, data leakage, or disruption of remote sessions. Confidentiality is at high risk as attackers can intercept and alter sensitive session data. Integrity is compromised because unauthorized configuration changes can alter the behavior of the client or the remote connection. Availability impact is lower but possible if malicious configurations disrupt service. Since the vulnerability requires no authentication and can be exploited remotely via MitM attacks, attackers can target users on insecure networks or those tricked into clicking malicious URIs. This threat is especially critical for organizations relying on RustDesk for secure remote access, including IT support teams, managed service providers, and remote workers. Without timely mitigation, attackers could leverage this vulnerability to gain footholds in corporate networks or exfiltrate sensitive information.
Mitigation Recommendations
To mitigate CVE-2026-30797, organizations should take the following specific actions: 1) Monitor RustDesk Client vendor announcements closely and apply security patches immediately once released. 2) Until patches are available, restrict RustDesk Client usage to trusted networks with strong encryption and avoid use over public or untrusted Wi-Fi to reduce MitM attack risk. 3) Employ network-level protections such as TLS interception detection, DNS filtering, and network segmentation to limit exposure. 4) Educate users to avoid clicking on untrusted or unsolicited URI links that could trigger the vulnerable importConfig() functionality. 5) Implement endpoint detection and response (EDR) solutions to monitor for suspicious RustDesk client behavior or unauthorized configuration changes. 6) Consider using alternative remote desktop solutions with verified secure authorization mechanisms if immediate patching is not feasible. 7) Conduct regular audits of remote access configurations and logs to detect anomalies potentially related to exploitation attempts. These targeted measures go beyond generic advice by focusing on mitigating the specific attack vector (Flutter URI scheme handler) and the man-in-the-middle exploitation method.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VULSec
- Date Reserved
- 2026-03-05T14:13:37.203Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a9c05f460e1c85df0c5c5a
Added to database: 3/5/2026, 5:41:51 PM
Last enriched: 3/5/2026, 5:50:31 PM
Last updated: 3/5/2026, 7:04:21 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3459: CWE-434 Unrestricted Upload of File with Dangerous Type in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
HighCVE-2026-3047: Authentication Bypass by Primary Weakness in Red Hat Red Hat Build of Keycloak
HighCVE-2026-3009: Improper Authorization in Red Hat Red Hat Build of Keycloak
HighCVE-2026-28287: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in FreePBX security-reporting
HighCVE-2026-28284: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FreePBX security-reporting
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.