A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options().
This issue affects RustDesk Client: through 1.4.5.
References
| Link | Resource |
|---|---|
| https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub | Exploit Third Party Advisory |
| https://rustdesk.com/docs/en/self-host/client-configuration/advanced-settings/ | Product Vendor Advisory |
| https://www.vulsec.org/ | Not Applicable |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-05 16:16
Updated : 2026-03-25 15:35
NVD link : CVE-2026-30792
Mitre link : CVE-2026-30792
CVE.ORG link : CVE-2026-30792
JSON object : View
Products Affected
apple
- macos
- iphone_os
microsoft
- windows
rustdesk
- rustdesk
- android
linux
- linux_kernel
CWE
CWE-657
Violation of Secure Design Principles
