Description
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id().

This issue affects RustDesk Client: through 1.4.5.
Published: 2026-03-05
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Patch
AI Analysis

Impact

The vulnerability in RustDesk Client arises from improper handling of password security, including the use of a weak password hash with insufficient computational effort, a fixed zero nonce, and a world‑readable machine ID. These weaknesses enable prototype pollution through the hbb_common library and allow an attacker to read encrypted configuration files, ultimately retrieving embedded local passwords or other sensitive data. The flaw leverages CWE‑1321, CWE‑257, CWE‑323, and CWE‑916 weaknesses in the encryption and key derivation process. The consequence is a compromise of user confidentiality, potentially exposing credentials used to authenticate to remote peers or other services. No information is given about denial of service or integrity tampering, only the confidentiality impact.

Affected Systems

RustDesk Client versions up to and including 1.4.5 on Windows, macOS, and Linux are affected. The issue is present in the password security module, config encryption module, and machine UID generation code of the RustDesk Client.

Risk and Exploitability

The CVSS score of 8.2 indicates a high severity, while the EPSS score of <1% suggests a low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. The attack vector is most likely local, requiring access to the client’s configuration files, though an attacker who can place a crafted prototype pollution payload could potentially exploit the weakness remotely if the client parses untrusted data. Because the compromised data include passwords stored in plain‑text form within the configuration, an attacker with sufficient access can mount credential‑stuffing or further attacks against other systems. Given the severity, organizations running affected versions should prioritize remediation.

Generated by OpenCVE AI on April 16, 2026 at 12:19 UTC.

Remediation

Vendor Solution

Use one-way hashing (Argon2id) for passwords. Use OS-native credential stores (DPAPI, Keychain, libsecret) for recoverable secrets. Apply proper KDF. Use random nonces.


Vendor Workaround

Set restrictive file permissions on TOML config files. Avoid saving peer passwords.


OpenCVE Recommended Actions

  • Upgrade to a RustDesk Client release that implements Argon2id hashing, uses OS‑native credential stores, applies a proper key derivation function, and generates random nonces for encryption.
  • Set restrictive file permissions on the TOML configuration files to prevent non‑authorized read access.
  • Avoid storing peer passwords in the client’s configuration when possible or remove them entirely if they are retained.
  • If an upgrade is not immediately possible, monitor for official patches and prepare to apply them as soon as they become available.

Generated by OpenCVE AI on April 16, 2026 at 12:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
Rustdesk
Rustdesk rustdesk
CPEs cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:-:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
Rustdesk
Rustdesk rustdesk
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Fri, 06 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Rustdesk-client
Rustdesk-client rustdesk Client
Vendors & Products Rustdesk-client
Rustdesk-client rustdesk Client

Fri, 06 Mar 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 18:15:00 +0000


Thu, 05 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id(). This issue affects RustDesk Client: through 1.4.5.
Title RustDesk Encrypts Local Passwords with World-Readable Machine ID and Fixed Zero Nonce (XSalsa20-Poly1305)
Weaknesses CWE-1321
CWE-257
CWE-323
CWE-916
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N'}


Subscriptions

Apple Macos
Linux Linux Kernel
Microsoft Windows
Rustdesk Rustdesk
Rustdesk-client Rustdesk Client
cve-icon MITRE

Status: PUBLISHED

Assigner: VULSec

Published:

Updated: 2026-03-06T10:32:38.348Z

Reserved: 2026-03-05T14:13:35.407Z

Link: CVE-2026-30785

cve-icon Vulnrichment

Updated: 2026-03-06T10:32:34.241Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T16:16:19.270

Modified: 2026-03-25T15:47:08.027

Link: CVE-2026-30785

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T12:30:06Z