Executive Risk Summary
"A Cleartext Transmission of Sensitive Information vulnerability in RustDesk Client allows sniffing attacks, potentially exposing sensitive information. This vulnerability affects RustDesk Client versions through 1.4.5."
Anticipated Attack Path
- 1. An attacker intercepts RustDesk Client communication
- 2. The attacker extracts sensitive information from the cleartext transmission
- 3. The attacker uses the extracted information for malicious purposes
Am I Vulnerable?
- Is your RustDesk Client version 1.4.5 or earlier?
- Do you use the Heartbeat sync loop modules?
- Is your network traffic not encrypted?
Operational Audit Arsenal
Target Type Program Files
Target Asset src/hbbs_http/sync.Rs
Standard Path RustDesk Client installation directory
Manual Verification Required
This is a non-Windows asset (RustDesk). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.
Patch Impact Forecast
Reboot Required Unlikely
Minimal
Internal Work Notes
RustDesk Client vulnerability CVE-2026-30795 - potential sensitive information exposure due to cleartext transmission
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Related RustDesk Threats
Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.