CVE-2026-30789

Severity CVSS v4.0:
CRITICAL
Type:
Unavailable / Other
Publication date:
05/03/2026
Last modified:
25/03/2026

Description

Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction.<br /> <br /> This issue affects RustDesk Client: through 1.4.5.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:webclient:*:*:* 1.4.5 (including)
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*