CVE-2026-30789
RustDesk Client Generates Auth Proof Without Client-Side Nonce, Enabling Replay Attacks
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
| CWE | CWE-294 CWE-916 |
| Vendor | rustdesk-client |
| Product | rustdesk client |
| Published | Mar 5, 2026 |
| Last Updated | Mar 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for rustdesk-client rustdesk client
Be the first to know when new unknown vulnerabilities affecting rustdesk-client rustdesk client are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
rustdesk-client / RustDesk Client
0 โค 1.4.5
References
Credits
Erez Kalman ๐ Erez Kalman