Executive Risk Summary
"The RustDesk Client is vulnerable to an authentication bypass by capture-replay and use of password hash with insufficient computational effort, allowing attackers to reuse session IDs. This vulnerability affects RustDesk Client versions through 1.4.5 on multiple platforms, including Windows, MacOS, Linux, iOS, and Android."
Anticipated Attack Path
- 1. An attacker captures a valid session ID from a legitimate user
- 2. The attacker reuses the captured session ID to gain unauthorized access to the RustDesk Client
- 3. The attacker exploits the vulnerability to access sensitive data or perform malicious actions
Am I Vulnerable?
- Is your RustDesk Client version 1.4.5 or earlier?
- Are you using the affected client login or peer authentication modules?
- Have you implemented any mitigations or workarounds to prevent session ID reuse?
Operational Audit Arsenal
Target Type Program Files
Target Asset src/client.Rs
Standard Path RustDesk Client installation directory
Manual Verification Required
This is a non-Windows asset (RustDesk). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.
Patch Impact Forecast
Reboot Required Unlikely
Minimal, as the patch only updates the client software
Internal Work Notes
RustDesk Client authentication bypass vulnerability (CVE-2026-30789) - update to version 1.4.6 or later to prevent session ID reuse and ensure secure authentication
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Related RustDesk Threats
Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.