Description
Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction.

This issue affects RustDesk Client: through 1.4.5.
Published: 2026-03-05
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass via Session Replay
Action: Patch Immediately
AI Analysis

Impact

The vulnerability in RustDesk Client allows an adversary to generate authentication proofs without a client‑side nonce, thereby enabling session replay attacks. An attacker who captures a valid session identifier can reuse it to bypass authentication and gain authorized access to a RustDesk session. This represents a critical failure in the credential proof mechanism, corresponding to weaknesses that allow replay or reuse of authentication data (CWE‑294) and the lack of protective measures for cryptographic material (CWE‑916). The impact is the ability to impersonate a legitimate client or peer and possibly execute actions within the remote session without any additional credentials.

Affected Systems

RustDesk Client versions up to and including 1.4.5 on all supported platforms—Windows, macOS, Linux, iOS, Android, and the web client—are affected. All installations of these platforms using the client login or peer authentication modules are vulnerable.

Risk and Exploitability

The CVSS score of 9.3 classifies this flaw as critical, and the EPSS score of <1% indicates a low estimated probability of exploitation, though the actual risk remains high due to the severe impact of credential bypass. The vulnerability is not listed in CISA’s KEV catalog. exploitation typically requires the attacker to obtain a valid session identifier, likely through network eavesdropping or a man‑in‑the‑middle position. Once the session ID is captured, the attacker can replay the authentication proof unopposed, gaining authorized access. The vendor’s recommended fix—adding a client‑side nonce and adopting SRP—directly addresses the root cause, while the workaround of enforcing long passwords and enabling two‑factor authentication raises the barrier for successful attacks until a patch is deployed.

Generated by OpenCVE AI on April 16, 2026 at 04:41 UTC.

Remediation

Vendor Solution

Add client-side nonce to auth proof. Implement SRP.


Vendor Workaround

Use long (16+ char) random passwords. Enable 2FA where available.


OpenCVE Recommended Actions

  • Update RustDesk Client to version 1.4.6 or later.
  • Apply the vendor patch that adds a client‑side nonce and implements SRP.
  • Until a proper fix is available, enforce passwords longer than 16 characters and enable two‑factor authentication.

Generated by OpenCVE AI on April 16, 2026 at 04:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple iphone Os
Apple macos
Google
Google android
Linux
Linux linux Kernel
Microsoft
Microsoft windows
Rustdesk
Rustdesk rustdesk
CPEs cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:webclient:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple iphone Os
Apple macos
Google
Google android
Linux
Linux linux Kernel
Microsoft
Microsoft windows
Rustdesk
Rustdesk rustdesk
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 17 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 18:15:00 +0000


Thu, 05 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
Title RustDesk Client Generates Auth Proof Without Client-Side Nonce, Enabling Replay Attacks
First Time appeared Rustdesk-client
Rustdesk-client rustdesk Client
Weaknesses CWE-294
CWE-916
CPEs cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:android:*:*:*:*:*
cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:ios:*:*:*:*:*
cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:linux:*:*:*:*:*
cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:macos:*:*:*:*:*
cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:windows:*:*:*:*:*
Vendors & Products Rustdesk-client
Rustdesk-client rustdesk Client
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Apple Iphone Os Macos
Google Android
Linux Linux Kernel
Microsoft Windows
Rustdesk Rustdesk
Rustdesk-client Rustdesk Client
cve-icon MITRE

Status: PUBLISHED

Assigner: VULSec

Published:

Updated: 2026-03-17T14:32:45.784Z

Reserved: 2026-03-05T14:13:37.202Z

Link: CVE-2026-30789

cve-icon Vulnrichment

Updated: 2026-03-05T16:31:23.729Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-05T16:16:19.560

Modified: 2026-03-25T15:43:45.563

Link: CVE-2026-30789

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:45:16Z

Weaknesses