CVE-2024-25140

CRITICAL

RustDesk 1.2.3 - Improper Certificate Validation via Trusted Root Certificate Installation

Title source: llm
STIX 2.1

Description

A default installation of RustDesk 1.2.3 on Windows places a WDKTestCert certificate under Trusted Root Certification Authorities with Enhanced Key Usage of Code Signing (1.3.6.1.5.5.7.3.3), valid from 2023 until 2033. This is potentially unwanted, e.g., because there is no public documentation of security measures for the private key, and arbitrary software could be signed if the private key were to be compromised. NOTE: the vendor's position is "we do not have EV cert, so we use test cert as a workaround." Insertion into Trusted Root Certification Authorities was the originally intended behavior, and the UI ensured that the certificate installation step (checked by default) was visible to the user before proceeding with the product installation.

References (3)

Core 3
Core References
Issue Tracking, Technical Description
https://serverfault.com/questions/837994

Scores

CVSS v3 9.8
EPSS 0.0029
EPSS Percentile 52.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-295
Status published
Products (1)
rustdesk/rustdesk 1.2.3
Published Feb 06, 2024
Tracked Since Feb 18, 2026