Unrated severityNVD Advisory· Published Mar 5, 2026· Updated Mar 17, 2026
RustDesk Client Generates Auth Proof Without Client-Side Nonce, Enabling Replay Attacks
CVE-2026-30789
Description
Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction.
This issue affects RustDesk Client: through 1.4.5.
Affected products
1- Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pubmitrethird-party-advisoryexploit
- www.vulsec.orgmitrevdb-entrythird-party-advisory
- rustdesk.com/docs/en/client/mitretechnical-descriptionx_--config documentation
News mentions
0No linked articles in our index yet.