๐Ÿ” CVE Alert

CVE-2026-30785

UNKNOWN 0.0

RustDesk Encrypts Local Passwords with World-Readable Machine ID and Fixed Zero Nonce (XSalsa20-Poly1305)

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id(). This issue affects RustDesk Client: through 1.4.5.

CWE CWE-257 CWE-1321 CWE-323 CWE-916
Vendor rustdesk-client
Product rustdesk client
Published Mar 5, 2026
Last Updated Mar 6, 2026
Stay Ahead of the Next One

Get instant alerts for rustdesk-client rustdesk client

Be the first to know when new unknown vulnerabilities affecting rustdesk-client rustdesk client are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

rustdesk-client / RustDesk Client
0 โ‰ค 1.4.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/rustdesk/rustdesk/discussions/9229 github.com: https://github.com/rustdesk/rustdesk/discussions/4979 docs.google.com: https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub vulsec.org: https://www.vulsec.org/

Credits

Erez Kalman ๐Ÿ” Erez Kalman