CVE-2026-30785

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id(). This issue affects RustDesk Client: through 1.4.5.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:-:*:*:*
OR cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-05 16:16

Updated : 2026-03-25 15:47


NVD link : CVE-2026-30785

Mitre link : CVE-2026-30785

CVE.ORG link : CVE-2026-30785


JSON object : View

Products Affected

microsoft

  • windows

linux

  • linux_kernel

rustdesk

  • rustdesk

apple

  • macos
CWE
CWE-257

Storing Passwords in a Recoverable Format

CWE-323

Reusing a Nonce, Key Pair in Encryption

CWE-916

Use of Password Hash With Insufficient Computational Effort

CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')