Home

Description

A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options(). This issue affects RustDesk Client: through 1.4.5.

PUBLISHED Reserved 2026-03-05 | Published 2026-03-05 | Updated 2026-03-06 | Assigner VULSec




CRITICAL: 9.1CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-657

Product status

Default status
affected

Any version
affected

Credits

Erez Kalman finder

Erez Kalman reporter

References

rustdesk.com/...host/client-configuration/advanced-settings/ technical-description

docs.google.com/...QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub third-party-advisory exploit

www.vulsec.org/ vdb-entry third-party-advisory

cve.org (CVE-2026-30792)

nvd.nist.gov (CVE-2026-30792)

Download JSON