Home RustDesk CVE-2026-30789
Back to RustDesk

CVE-2026-30789

RustDesk Client

RustDesk CVSS 9.8 Updated March 31, 2026

Executive Risk Summary

"The RustDesk Client is vulnerable to an authentication bypass by capture-replay and use of password hash with insufficient computational effort, allowing attackers to reuse session IDs. This vulnerability affects RustDesk Client versions through 1.4.5 on multiple platforms, including Windows, MacOS, Linux, iOS, and Android."

Anticipated Attack Path

  1. 1. An attacker captures a valid session ID from a legitimate user
  2. 2. The attacker reuses the captured session ID to gain unauthorized access to the RustDesk Client
  3. 3. The attacker exploits the vulnerability to access sensitive data or perform malicious actions

Am I Vulnerable?

  • Is your RustDesk Client version 1.4.5 or earlier?
  • Are you using the affected client login or peer authentication modules?
  • Have you implemented any mitigations or workarounds to prevent session ID reuse?

Operational Audit Arsenal

Target Type Program Files
Target Asset src/client.Rs
Standard Path RustDesk Client installation directory

Manual Verification Required

This is a non-Windows asset (RustDesk). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only updates the client software

Internal Work Notes

RustDesk Client authentication bypass vulnerability (CVE-2026-30789) - update to version 1.4.6 or later to prevent session ID reuse and ensure secure authentication

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related RustDesk Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.