Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id().
This issue affects RustDesk Client: through 1.4.5.
References
| Link | Resource |
|---|---|
| https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub | Exploit Third Party Advisory |
| https://github.com/rustdesk/rustdesk/discussions/4979 | Issue Tracking |
| https://github.com/rustdesk/rustdesk/discussions/9229 | Issue Tracking |
| https://www.vulsec.org/ | Not Applicable |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-05 16:16
Updated : 2026-03-25 15:47
NVD link : CVE-2026-30785
Mitre link : CVE-2026-30785
CVE.ORG link : CVE-2026-30785
JSON object : View
Products Affected
microsoft
- windows
linux
- linux_kernel
rustdesk
- rustdesk
apple
- macos
