Home RustDesk CVE-2024-25140
Back to RustDesk

CVE-2024-25140

RustDesk 1.2.3

RustDesk CVSS 9.8 Updated March 14, 2026

Executive Risk Summary

"A default installation of RustDesk 1.2.3 on Windows places a potentially unwanted WDKTestCert certificate under Trusted Root Certification Authorities, which could allow arbitrary software to be signed if the private key is compromised. This poses a risk to system security due to the lack of public documentation on security measures for the private key."

Operational Audit Arsenal

Target Type Certificate
Target Asset WDKTestCert
Standard Path %windir%\System32\drivers\etc\certs
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: WDKTestCert (Certificate)
$Targets = 'WDKTestCert'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Unlikely

Certificate trust and code signing services may be affected

Internal Work Notes

Investigate and potentially remove the WDKTestCert certificate from Trusted Root Certification Authorities to prevent potential code signing vulnerabilities.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related RustDesk Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.