Impact
The vulnerability arises from a bug in the RustDesk Client's HTTP API code that causes the HTTP client to silently accept TLS certificates marked as invalid after a handshake failure. This flaw allows a man‑in‑the‑middle attacker to present a forged or expired certificate and have the client trust it, enabling full interception of encrypted traffic and potentially credential theft. The weakness is a classic improper certificate validation error (CWE‑295).
Affected Systems
Affected binaries include any installation of RustDesk Client through version 1.4.5 on Windows, macOS, Linux, iOS, and Android. The issue resides in the HTTP client module and the TLS retry routine that enables the dangerous_accept_invalid_certs option. The clients listed in known CPEs, such as rustdesk-client:rustdesk_client on all major operating systems, are vulnerable.
Risk and Exploitability
The CVSS score of 9.1 marks this as a high‑severity vulnerability. Although the EPSS score is below 1 %, indicating a very low current exploitation probability, the potential impact of a successful Adversary in the Middle remains high. The flaw is not yet included in the CISA KEV catalog, but the absence of a KEV listing does not reduce the risk. Attackers would need to force a TLS handshake failure or redirect connections to their own server, conditions that are achievable with basic network interception tools. Mitigation requires removing the automatic fallback or upgrading to a fixed version.
OpenCVE Enrichment