Impact
Missing authentication and authorization checks in the hbbs (rendezvous) and hbbr (relay) modules of RustDesk Server allow attackers to connect to the broker services without credentials, enabling privilege abuse. The vulnerability is located in functions that handle punch–hole requests and peer registration, potentially allowing an unauthenticated user to interfere with session establishment or routing. This can compromise confidentiality and availability of remote sessions and may provide a foothold for further exploitation. Based on the description, it is inferred that attackers would need to establish a network connection to the hbbs/hbbr broker services, likely via the default listening ports (21116 for hbbs and 21117 for hbbr).
Affected Systems
The flaw is present in all RustDesk Server releases up to and including version 1.7.5 and 1.1.15. Both the OSS and Pro variants, running on any supported operating system, are affected. The vulnerable components are the rendezvous (hbbs) and relay (hbbr) servers listening on ports 21116 and 21117.
Risk and Exploitability
The vulnerability has a CVSS score of 8.8, indicating high severity, and an EPSS score below 1 %, meaning low but nonzero exploitation probability. It is not listed in the CISA KEV catalog. Based on the description, it is inferred that attackers would require network access to the broker services; once connected, they could perform privileged operations by bypassing authentication. The vulnerability is related to CWE‑306 and CWE‑862.
OpenCVE Enrichment