Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30798: CWE-345 Insufficient Verification of Data Authenticity in rustdesk-client RustDesk Client

0
High
VulnerabilityCVE-2026-30798cvecve-2026-30798cwe-345cwe-755
Published: Thu Mar 05 2026 (03/05/2026, 15:38:49 UTC)
Source: CVE Database V5
Vendor/Project: rustdesk-client
Product: RustDesk Client

Description

Insufficient Verification of Data Authenticity, Improper Handling of Exceptional Conditions vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Heartbeat sync loop, strategy processing modules) allows Protocol Manipulation. This vulnerability is associated with program files src/hbbs_http/sync.Rs and program routines stop-service handler in heartbeat loop. This issue affects RustDesk Client: through 1.4.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/17/2026, 18:22:46 UTC

Technical Analysis

CVE-2026-30798 is a vulnerability classified under CWE-345 (Insufficient Verification of Data Authenticity) and CWE-755 (Improper Handling of Exceptional Conditions) affecting the RustDesk Client, a popular open-source remote desktop software. The issue resides in the heartbeat synchronization loop and strategy processing modules, specifically within the src/hbbs_http/sync.Rs source file and the stop-service handler routine. These components are responsible for maintaining persistent communication and service state between client and server. Due to inadequate verification of incoming data authenticity, an attacker can manipulate the protocol messages exchanged during the heartbeat sync process. This manipulation can lead to unauthorized control over client behavior, potentially causing denial of service or other disruptions. The vulnerability affects all major platforms supported by RustDesk, including Windows, MacOS, Linux, iOS, and Android, up to version 1.4.5. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates that the attack can be performed remotely over the network with low complexity, requires partial attacker's effort, no privileges or user interaction, and results in high impact on availability. No patches or exploit code are currently publicly available, but the vulnerability's nature suggests it could be leveraged for protocol-level attacks disrupting remote desktop sessions or causing client instability.

Potential Impact

The vulnerability poses a significant risk to organizations using RustDesk for remote desktop access and management. Successful exploitation can lead to denial of service by disrupting the heartbeat synchronization, causing remote sessions to drop or become unstable. This can interrupt critical business operations, especially in environments relying on remote support or administration. Additionally, protocol manipulation could be leveraged to alter client behavior, potentially enabling further attacks or unauthorized access if combined with other vulnerabilities. Given RustDesk's cross-platform support, a wide range of devices including desktops, laptops, and mobile endpoints are at risk. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation in hostile network environments. Although no exploits are currently known in the wild, the vulnerability's high CVSS score and broad platform impact necessitate urgent attention to prevent potential service outages and security breaches.

Mitigation Recommendations

To mitigate this vulnerability, organizations should monitor RustDesk vendor communications closely and apply security patches immediately once released. In the interim, network-level controls such as firewall rules restricting RustDesk traffic to trusted IP addresses and VPN usage can reduce exposure. Employing network intrusion detection systems (NIDS) to detect anomalous protocol manipulations in heartbeat messages may help identify exploitation attempts. Administrators should audit and limit RustDesk client deployments to essential systems only and enforce strict access controls. Additionally, isolating remote desktop infrastructure from untrusted networks and segmenting critical assets can minimize impact. Regularly updating all software dependencies and monitoring for unusual client behavior or service interruptions will aid early detection. Finally, educating users about potential remote session disruptions and encouraging reporting of connectivity issues can support rapid response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VULSec
Date Reserved
2026-03-05T14:13:37.203Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9c05f460e1c85df0c5c5d

Added to database: 3/5/2026, 5:41:51 PM

Last enriched: 3/17/2026, 6:22:46 PM

Last updated: 4/19/2026, 7:56:18 PM

Views: 341

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses