Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3598: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in rustdesk-server-pro RustDesk Server Pro

0
High
VulnerabilityCVE-2026-3598cvecve-2026-3598cwe-327cwe-684
Published: Thu Mar 05 2026 (03/05/2026, 14:14:11 UTC)
Source: CVE Database V5
Vendor/Project: rustdesk-server-pro
Product: RustDesk Server Pro

Description

Use of a Broken or Risky Cryptographic Algorithm vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Config string generation, web console export modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program routines Config export/generation routines. This issue affects RustDesk Server Pro: through 1.7.5.

AI-Powered Analysis

AILast updated: 03/05/2026, 14:34:38 UTC

Technical Analysis

CVE-2026-3598 identifies a vulnerability in RustDesk Server Pro, a remote desktop server software, where broken or risky cryptographic algorithms are used in the generation and export of configuration strings and web console modules. These cryptographic weaknesses stem from improper or outdated algorithms that fail to adequately protect sensitive embedded data within configuration exports. The vulnerability affects all supported platforms—Windows, MacOS, and Linux—up to version 1.7.5. Because the cryptographic protection is weak, attackers can remotely retrieve sensitive configuration data without any authentication or user interaction, potentially exposing credentials, keys, or other secrets embedded in the configuration. The CVSS 4.0 vector (AV:N/AC:L/PR:N/UI:N/VC:H/VI:N/VA:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality only. This vulnerability is linked to CWE-327 (Use of a Broken or Risky Cryptographic Algorithm) and CWE-684 (Incorrect Control Flow Implementation), suggesting that both cryptographic choice and program logic contribute to the issue. Although no public exploits are currently known, the vulnerability poses a significant risk due to the sensitive nature of the data exposed and the ease of exploitation. The lack of available patches at the time of publication necessitates urgent attention from users of RustDesk Server Pro to mitigate potential data leakage risks.

Potential Impact

The primary impact of CVE-2026-3598 is the unauthorized disclosure of sensitive embedded data within RustDesk Server Pro configuration exports. This can lead to exposure of credentials, cryptographic keys, or other confidential information critical to the security posture of organizations using this software. Such data leakage can facilitate further attacks, including unauthorized remote access, lateral movement within networks, or compromise of other integrated systems. Because the vulnerability requires no authentication or user interaction and can be exploited remotely, it significantly increases the attack surface. Organizations relying on RustDesk Server Pro for remote desktop services, especially those in sensitive sectors like finance, healthcare, government, and critical infrastructure, face heightened risk of data breaches and operational disruption. The cross-platform nature of the vulnerability means that diverse environments are affected, complicating incident response and mitigation efforts. Although no active exploitation is reported, the high CVSS score reflects the potential for severe confidentiality breaches if exploited.

Mitigation Recommendations

To mitigate CVE-2026-3598, organizations should immediately assess their use of RustDesk Server Pro and prioritize upgrading to a version where this vulnerability is patched once available. In the absence of an official patch, administrators should restrict network access to RustDesk Server Pro management interfaces, limiting exposure to trusted internal networks or VPNs. Implement network-level controls such as firewalls and intrusion detection systems to monitor and block suspicious access attempts targeting configuration export endpoints. Review and rotate any cryptographic keys, credentials, or sensitive data that may have been exposed through configuration exports. Additionally, consider disabling or restricting configuration export features if feasible until a secure update is deployed. Conduct thorough audits of RustDesk Server Pro logs and network traffic for signs of exploitation attempts. Engage with the vendor or security community for updates on patches or workarounds. Finally, educate system administrators about the risks of weak cryptography and the importance of timely updates to cryptographic libraries and software components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VULSec
Date Reserved
2026-03-05T13:26:50.447Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a993803bbe47dd19a952ae

Added to database: 3/5/2026, 2:30:24 PM

Last enriched: 3/5/2026, 2:34:38 PM

Last updated: 3/5/2026, 3:24:05 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses