CVE-2026-30789
🔴 Łataj teraz
Obejście uwierzytelnienia w RustDesk Client umożliwia ponowne wykorzystanie identyfikatorów sesji.
CVSS
9.8
EPSS
0.1%
Exploit
poc
Vendor
apple
Opis źródłowy (NVD)
Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.
auth-bypass exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-03-05 16:16:19 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-25 15:43:45 UTC |
Referencje
- https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub (2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe) [Exploit, Third Party Advisory]
- https://rustdesk.com/docs/en/client/ (2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe) [Product]
- https://www.vulsec.org/ (2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe) [Not Applicable]