This issue affects RustDesk Client: through 1.4.5.
Project Subscriptions
No data.
No advisories yet.
Solution
Use one-way hashing (Argon2id) for passwords. Use OS-native credential stores (DPAPI, Keychain, libsecret) for recoverable secrets. Apply proper KDF. Use random nonces.
Workaround
Set restrictive file permissions on TOML config files. Avoid saving peer passwords.
Thu, 05 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id(). This issue affects RustDesk Client: through 1.4.5. | |
| Title | RustDesk Encrypts Local Passwords with World-Readable Machine ID and Fixed Zero Nonce (XSalsa20-Poly1305) | |
| Weaknesses | CWE-1321 CWE-257 CWE-323 CWE-916 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VULSec
Published:
Updated: 2026-03-05T16:04:36.443Z
Reserved: 2026-03-05T14:13:35.407Z
Link: CVE-2026-30785
No data.
Status : Received
Published: 2026-03-05T16:16:19.270
Modified: 2026-03-05T16:16:19.270
Link: CVE-2026-30785
No data.
OpenCVE Enrichment
No data.