CVE-2026-30789

Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:webclient:*:*:*
OR cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-05 16:16

Updated : 2026-03-25 15:43


NVD link : CVE-2026-30789

Mitre link : CVE-2026-30789

CVE.ORG link : CVE-2026-30789


JSON object : View

Products Affected

apple

  • macos
  • iphone_os

microsoft

  • windows

rustdesk

  • rustdesk

google

  • android

linux

  • linux_kernel
CWE
CWE-294

Authentication Bypass by Capture-replay

CWE-916

Use of Password Hash With Insufficient Computational Effort