Authentication Bypass in RustDesk Client Across Multiple Platforms
CVE-2026-30789
9.3CRITICAL
Key Information:
- Vendor
Rustdesk-client
- Status
- Vendor
- CVE Published:
- 5 March 2026
Badges
๐พ Exploit Exists
What is CVE-2026-30789?
The RustDesk Client suffers from an authentication bypass vulnerability that allows attackers to reuse session IDs, enabling unauthorized access to user sessions. This issue affects all platforms including Windows, MacOS, Linux, iOS, and Android, and is tied to weaknesses in the peer authentication and client login modules. Specifically, vulnerabilities in the hash_password() routine and session proof construction can be exploited to bypass authentication mechanisms, increasing the risk of session hijacking.
Affected Version(s)
RustDesk Client Windows 0 <= 1.4.5
References
CVSS V4
Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
Credit
Erez Kalman
Erez Kalman
