Home RustDesk CVE-2026-30792
Back to RustDesk

CVE-2026-30792

RustDesk Client

RustDesk CVSS 8.1 Updated March 31, 2026

Executive Risk Summary

"A vulnerability in RustDesk Client allows Application API Message Manipulation via Man-in-the-Middle, affecting versions through 1.4.5. This vulnerability could lead to unauthorized access and data manipulation."

Anticipated Attack Path

  1. 1. An attacker intercepts communication between the RustDesk Client and the server.
  2. 2. The attacker manipulates API messages to gain unauthorized access or modify data.
  3. 3. The attacker exploits the vulnerability to achieve their malicious goals.

Am I Vulnerable?

  • Is your RustDesk Client version 1.4.5 or earlier?
  • Do you use the RustDesk Client on Windows, MacOS, Linux, iOS, Android, or WebClient?
  • Have you implemented additional security measures to prevent Man-in-the-Middle attacks?

Operational Audit Arsenal

Target Type Application
Target Asset RustDesk Client
Standard Path Management Plane / API Interface

Manual Verification Required

This is a non-Windows asset (RustDesk). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal

Internal Work Notes

Urgent: RustDesk Client vulnerability CVE-2026-30792 - potential for data manipulation and unauthorized access. Upgrade to a patched version or implement mitigating controls.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related RustDesk Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.