CVE-2026-30795

Cleartext Transmission of Sensitive Information vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Heartbeat sync loop modules) allows Sniffing Attacks. This vulnerability is associated with program files src/hbbs_http/sync.Rs and program routines Heartbeat JSON payload construction (preset-address-book-password). This issue affects RustDesk Client: through 1.4.5.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:webclient:*:*:*
OR cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

25 Mar 2026, 15:25

Type Values Removed Values Added
Summary
  • (es) Vulnerabilidad de transmisión en texto claro de información sensible en el cliente RustDesk (rustdesk-client) en Windows, MacOS, Linux, iOS, Android (módulos de bucle de sincronización de latidos) permite ataques de sniffing. Esta vulnerabilidad está asociada con los archivos de programa src/hbbs_http/sync.Rs y las rutinas de programa de construcción de carga útil JSON de latidos (preset-address-book-password). Este problema afecta al cliente RustDesk: hasta la versión 1.4.5.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Microsoft
Google
Google android
Rustdesk rustdesk
Linux linux Kernel
Linux
Rustdesk
Apple iphone Os
Microsoft windows
Apple macos
Apple
References () https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub - () https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub - Exploit, Third Party Advisory
References () https://github.com/rustdesk/rustdesk - () https://github.com/rustdesk/rustdesk - Product
References () https://www.vulsec.org/ - () https://www.vulsec.org/ - Not Applicable
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:webclient:*:*:*

05 Mar 2026, 19:16

Type Values Removed Values Added
References
  • () https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub -
  • () https://www.vulsec.org/ -

05 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 16:16

Updated : 2026-03-25 15:25


NVD link : CVE-2026-30795

Mitre link : CVE-2026-30795

CVE.ORG link : CVE-2026-30795


JSON object : View

Products Affected

rustdesk

  • rustdesk

google

  • android

microsoft

  • windows

apple

  • iphone_os
  • macos

linux

  • linux_kernel
CWE
CWE-319

Cleartext Transmission of Sensitive Information