CVE-2026-30798: CWE-345 Insufficient Verification of Data Authenticity in rustdesk-client RustDesk Client
Insufficient Verification of Data Authenticity, Improper Handling of Exceptional Conditions vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Heartbeat sync loop, strategy processing modules) allows Protocol Manipulation. This vulnerability is associated with program files src/hbbs_http/sync.Rs and program routines stop-service handler in heartbeat loop. This issue affects RustDesk Client: through 1.4.5.
AI Analysis
Technical Summary
CVE-2026-30798 is a vulnerability classified under CWE-345 (Insufficient Verification of Data Authenticity) and CWE-755 (Improper Handling of Exceptional Conditions) affecting the RustDesk Client, a popular open-source remote desktop software. The issue resides in the heartbeat synchronization loop and strategy processing modules, specifically within the src/hbbs_http/sync.Rs source file and the stop-service handler routine. These components are responsible for maintaining persistent communication and service state between client and server. Due to inadequate verification of incoming data authenticity, an attacker can manipulate the protocol messages exchanged during the heartbeat sync process. This manipulation can lead to unauthorized control over client behavior, potentially causing denial of service or other disruptions. The vulnerability affects all major platforms supported by RustDesk, including Windows, MacOS, Linux, iOS, and Android, up to version 1.4.5. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates that the attack can be performed remotely over the network with low complexity, requires partial attacker's effort, no privileges or user interaction, and results in high impact on availability. No patches or exploit code are currently publicly available, but the vulnerability's nature suggests it could be leveraged for protocol-level attacks disrupting remote desktop sessions or causing client instability.
Potential Impact
The vulnerability poses a significant risk to organizations using RustDesk for remote desktop access and management. Successful exploitation can lead to denial of service by disrupting the heartbeat synchronization, causing remote sessions to drop or become unstable. This can interrupt critical business operations, especially in environments relying on remote support or administration. Additionally, protocol manipulation could be leveraged to alter client behavior, potentially enabling further attacks or unauthorized access if combined with other vulnerabilities. Given RustDesk's cross-platform support, a wide range of devices including desktops, laptops, and mobile endpoints are at risk. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation in hostile network environments. Although no exploits are currently known in the wild, the vulnerability's high CVSS score and broad platform impact necessitate urgent attention to prevent potential service outages and security breaches.
Mitigation Recommendations
To mitigate this vulnerability, organizations should monitor RustDesk vendor communications closely and apply security patches immediately once released. In the interim, network-level controls such as firewall rules restricting RustDesk traffic to trusted IP addresses and VPN usage can reduce exposure. Employing network intrusion detection systems (NIDS) to detect anomalous protocol manipulations in heartbeat messages may help identify exploitation attempts. Administrators should audit and limit RustDesk client deployments to essential systems only and enforce strict access controls. Additionally, isolating remote desktop infrastructure from untrusted networks and segmenting critical assets can minimize impact. Regularly updating all software dependencies and monitoring for unusual client behavior or service interruptions will aid early detection. Finally, educating users about potential remote session disruptions and encouraging reporting of connectivity issues can support rapid response.
Affected Countries
United States, Germany, China, India, United Kingdom, Canada, Australia, France, Japan, South Korea
CVE-2026-30798: CWE-345 Insufficient Verification of Data Authenticity in rustdesk-client RustDesk Client
Description
Insufficient Verification of Data Authenticity, Improper Handling of Exceptional Conditions vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Heartbeat sync loop, strategy processing modules) allows Protocol Manipulation. This vulnerability is associated with program files src/hbbs_http/sync.Rs and program routines stop-service handler in heartbeat loop. This issue affects RustDesk Client: through 1.4.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-30798 is a vulnerability classified under CWE-345 (Insufficient Verification of Data Authenticity) and CWE-755 (Improper Handling of Exceptional Conditions) affecting the RustDesk Client, a popular open-source remote desktop software. The issue resides in the heartbeat synchronization loop and strategy processing modules, specifically within the src/hbbs_http/sync.Rs source file and the stop-service handler routine. These components are responsible for maintaining persistent communication and service state between client and server. Due to inadequate verification of incoming data authenticity, an attacker can manipulate the protocol messages exchanged during the heartbeat sync process. This manipulation can lead to unauthorized control over client behavior, potentially causing denial of service or other disruptions. The vulnerability affects all major platforms supported by RustDesk, including Windows, MacOS, Linux, iOS, and Android, up to version 1.4.5. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) indicates that the attack can be performed remotely over the network with low complexity, requires partial attacker's effort, no privileges or user interaction, and results in high impact on availability. No patches or exploit code are currently publicly available, but the vulnerability's nature suggests it could be leveraged for protocol-level attacks disrupting remote desktop sessions or causing client instability.
Potential Impact
The vulnerability poses a significant risk to organizations using RustDesk for remote desktop access and management. Successful exploitation can lead to denial of service by disrupting the heartbeat synchronization, causing remote sessions to drop or become unstable. This can interrupt critical business operations, especially in environments relying on remote support or administration. Additionally, protocol manipulation could be leveraged to alter client behavior, potentially enabling further attacks or unauthorized access if combined with other vulnerabilities. Given RustDesk's cross-platform support, a wide range of devices including desktops, laptops, and mobile endpoints are at risk. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation in hostile network environments. Although no exploits are currently known in the wild, the vulnerability's high CVSS score and broad platform impact necessitate urgent attention to prevent potential service outages and security breaches.
Mitigation Recommendations
To mitigate this vulnerability, organizations should monitor RustDesk vendor communications closely and apply security patches immediately once released. In the interim, network-level controls such as firewall rules restricting RustDesk traffic to trusted IP addresses and VPN usage can reduce exposure. Employing network intrusion detection systems (NIDS) to detect anomalous protocol manipulations in heartbeat messages may help identify exploitation attempts. Administrators should audit and limit RustDesk client deployments to essential systems only and enforce strict access controls. Additionally, isolating remote desktop infrastructure from untrusted networks and segmenting critical assets can minimize impact. Regularly updating all software dependencies and monitoring for unusual client behavior or service interruptions will aid early detection. Finally, educating users about potential remote session disruptions and encouraging reporting of connectivity issues can support rapid response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VULSec
- Date Reserved
- 2026-03-05T14:13:37.203Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a9c05f460e1c85df0c5c5d
Added to database: 3/5/2026, 5:41:51 PM
Last enriched: 3/17/2026, 6:22:46 PM
Last updated: 4/19/2026, 7:56:18 PM
Views: 341
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.