Home RustDesk CVE-2026-30794
Back to RustDesk

CVE-2026-30794

RustDesk Client

RustDesk CVSS 8.1 Updated March 31, 2026

Executive Risk Summary

"A critical vulnerability in RustDesk Client allows an Adversary-in-the-Middle (AiTM) attack due to improper certificate validation, affecting versions up to 1.4.5. This vulnerability can lead to unauthorized access and data compromise."

Anticipated Attack Path

  1. 1. An attacker intercepts communication between the RustDesk Client and the server.
  2. 2. The attacker exploits the improper certificate validation to establish a malicious connection.
  3. 3. The attacker gains unauthorized access to sensitive data and systems.

Am I Vulnerable?

  • Is your RustDesk Client version 1.4.5 or earlier?
  • Do you use RustDesk Client on Windows, MacOS, Linux, iOS, or Android?
  • Have you implemented additional security measures to mitigate AiTM attacks?

Operational Audit Arsenal

Target Type Application
Target Asset rustdesk-client
Standard Path src/hbbs_http/http_client.Rs

Manual Verification Required

This is a non-Windows asset (RustDesk). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal

Internal Work Notes

Urgent: RustDesk Client vulnerability CVE-2026-30794 - Improper Certificate Validation. Upgrade to a patched version or apply mitigations to prevent AiTM attacks.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Related RustDesk Threats

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.