Improper Restriction of Excessive Authentication Attempts, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Peer authentication, API login modules), rustdesk-server RustDesk Server (OSS) rustdesk-server on Windows, MacOS, Linux (Peer authentication, API login modules) allows Password Brute Forcing. This vulnerability is associated with program files src/server/connection.Rs and program routines Salt/challenge generation, SHA256(SHA256(pwd+salt)+challenge) verification.
This issue affects RustDesk Server Pro: through 1.7.5; RustDesk Server (OSS): through 1.1.15.
References
| Link | Resource |
|---|---|
| https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub | Exploit Third Party Advisory |
| https://github.com/rustdesk | Product |
| https://www.vulsec.org/ | Not Applicable |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-05 16:16
Updated : 2026-03-25 15:43
NVD link : CVE-2026-30790
Mitre link : CVE-2026-30790
CVE.ORG link : CVE-2026-30790
JSON object : View
Products Affected
rustdesk
- rustdesk_server
microsoft
- windows
linux
- linux_kernel
apple
- macos
