Impact
The vulnerable RustDesk Server Pro exposes the preset address book password in plaintext when synchronizing over the heartbeat API. This cleartext transmission allows an attacker who can sniff network traffic to capture the password and potentially access the user's address book. Based on the description, it is inferred that this credential exposure could compromise the confidentiality of stored address book entries.
Affected Systems
The flaw is present in RustDesk Server Pro on Windows, macOS, and Linux platforms and applies to all releases through version 1.7.5. The API endpoint involved is part of the server's heartbeat and synchronization modules. Any deployment of RustDesk Server Pro older than or equal to 1.7.5 is susceptible.
Risk and Exploitability
The likely attack vector is passive sniffing of traffic between the client and the server. Based on the description, it is inferred that an attacker might also tamper with packets to send a plaintext password, though this is not explicitly stated. The vulnerability carries a CVSS score of 8.7, indicating high severity, but its EPSS score is below 1 %, suggesting a very low probability that exploitation will occur in the wild. The flaw is not listed in CISA's KEV catalog at this time.
OpenCVE Enrichment