A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options().

This issue affects RustDesk Client: through 1.4.5.

Project Subscriptions

Vendors Products
Rustdesk-client Subscribe
Rustdesk Client Subscribe
Advisories

No advisories yet.

Fixes

Solution

Enforce runtime toggle checks. Implement payload signing with server private key.


Workaround

None effective — allow-remote-config-modification toggle is ignored

History

Thu, 05 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options(). This issue affects RustDesk Client: through 1.4.5.
Title RustDesk Client Blindly Merges Unauthenticated Strategy Payloads, Bypassing Local Security Settings
First Time appeared Rustdesk-client
Rustdesk-client rustdesk Client
Weaknesses CWE-657
CPEs cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:android:*:*:*:*:*
cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:ios:*:*:*:*:*
cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:linux:*:*:*:*:*
cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:macos:*:*:*:*:*
cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:windows:*:*:*:*:*
Vendors & Products Rustdesk-client
Rustdesk-client rustdesk Client
References
Metrics cvssV4_0

{'score': 9.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VULSec

Published:

Updated: 2026-03-05T15:15:36.930Z

Reserved: 2026-03-05T14:13:37.203Z

Link: CVE-2026-30792

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-05T16:16:19.840

Modified: 2026-03-05T16:16:19.840

Link: CVE-2026-30792

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses