Home RustDesk CVE-2026-30783
Back to RustDesk

CVE-2026-30783

RustDesk Client

RustDesk CVSS 9.8 Updated March 31, 2026

Executive Risk Summary

"A vulnerability in RustDesk Client allows Privilege Abuse, affecting versions through 1.4.5. This vulnerability is associated with program files and routines related to API sync loop and config handling."

Anticipated Attack Path

  1. 1. An attacker exploits the vulnerability in the RustDesk Client
  2. 2. The attacker gains elevated privileges through the API sync loop or config handling
  3. 3. The attacker uses the elevated privileges to access sensitive data or systems

Am I Vulnerable?

  • Is your RustDesk Client version 1.4.5 or earlier?
  • Are you using the affected program files src/rendezvous_mediator.Rs or src/hbbs_http/sync.Rs?
  • Have you applied any patches or updates to address this vulnerability?

Operational Audit Arsenal

Target Type Software Component
Target Asset rustdesk-client
Standard Path Management Plane / Client Software

Manual Verification Required

This is a non-Windows asset (RustDesk). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only updates the client software

Internal Work Notes

RustDesk Client vulnerability CVE-2026-30783 - request update to version 1.4.6 or later to address privilege abuse risk

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related RustDesk Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.