Home RustDesk CVE-2026-30793
Back to RustDesk

CVE-2026-30793

RustDesk Client

RustDesk CVSS 9.8 Updated March 31, 2026

Executive Risk Summary

"A Cross-Site Request Forgery (CSRF) vulnerability in RustDesk Client allows for Privilege Escalation, affecting versions through 1.4.5. This vulnerability can be exploited to gain elevated privileges on the system."

Anticipated Attack Path

  1. 1. An attacker sends a malicious request to the victim's RustDesk Client
  2. 2. The victim's RustDesk Client processes the request, allowing the attacker to escalate privileges
  3. 3. The attacker gains elevated access to the system, potentially leading to further exploitation

Am I Vulnerable?

  • Is your RustDesk Client version 1.4.5 or earlier?
  • Are you using the Flutter URI scheme handler or FFI bridge modules?
  • Have you applied any patches or updates to address this vulnerability?

Operational Audit Arsenal

Target Type Application
Target Asset RustDesk Client
Standard Path Management Plane / Application Layer

Manual Verification Required

This is a non-Windows asset (RustDesk). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal

Internal Work Notes

CVE-2026-30793: RustDesk Client CSRF vulnerability allowing Privilege Escalation, affecting versions through 1.4.5. Recommend updating to latest version or applying patch.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related RustDesk Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.