Description
Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
Problem types
CWE-294 Authentication Bypass by Capture-replay
CWE-916 Use of Password Hash With Insufficient Computational Effort
Product status
Any version
Credits
Erez Kalman
Erez Kalman
References
rustdesk.com/docs/en/client/