CVE-2026-30789

CRITICAL

RustDesk Client <1.4.5 - Auth Bypass

Title source: llm
STIX 2.1

Description

Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.

Scores

CVSS v3 9.8
EPSS 0.0017
EPSS Percentile 37.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-294 CWE-916
Status published
Products (2)
rustdesk/rustdesk < 1.4.5
rustdesk-client/RustDesk Client < 1.4.5
Published Mar 05, 2026
Tracked Since Mar 05, 2026