Home

Description

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id(). This issue affects RustDesk Client: through 1.4.5.

PUBLISHED Reserved 2026-03-05 | Published 2026-03-05 | Updated 2026-03-05 | Assigner VULSec




HIGH: 8.2CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

CWE-257

CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

CWE-323

CWE-916 Use of Password Hash With Insufficient Computational Effort

Product status

Default status
affected

Any version
affected

Credits

Erez Kalman finder

Erez Kalman reporter

References

github.com/rustdesk/rustdesk/discussions/9229 technical-description

github.com/rustdesk/rustdesk/discussions/4979 technical-description

cve.org (CVE-2026-30785)

nvd.nist.gov (CVE-2026-30785)

Download JSON