← Retour aux CVEs
CVE-2026-30789
CRITICAL9.8
Description
Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie3/5/2026
Derniere modification3/25/2026
Sourcenvd
Observations honeypot0
Produits affectes
apple:iphone_osapple:macosgoogle:androidlinux:linux_kernelmicrosoft:windowsrustdesk:rustdesk
Faiblesses (CWE)
CWE-294CWE-916
References
https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub(2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe)
https://rustdesk.com/docs/en/client/(2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe)
https://www.vulsec.org/(2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.