CVE-2026-30798

Insufficient Verification of Data Authenticity, Improper Handling of Exceptional Conditions vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Heartbeat sync loop, strategy processing modules) allows Protocol Manipulation. This vulnerability is associated with program files src/hbbs_http/sync.Rs and program routines stop-service handler in heartbeat loop. This issue affects RustDesk Client: through 1.4.5.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:-:*:*:*
OR cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

10 Mar 2026, 20:25

Type Values Removed Values Added
References () https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub - () https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub - Third Party Advisory, Exploit
References () https://rustdesk.com/docs/en/client/ - () https://rustdesk.com/docs/en/client/ - Product
References () https://www.vulsec.org/ - () https://www.vulsec.org/ - Third Party Advisory
CPE cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:-:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
First Time Microsoft
Google
Google android
Rustdesk rustdesk
Linux linux Kernel
Linux
Rustdesk
Apple iphone Os
Microsoft windows
Apple macos
Apple
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
Summary
  • (es) Vulnerabilidad de Verificación Insuficiente de la Autenticidad de los Datos y Manejo Inadecuado de Condiciones Excepcionales en rustdesk-client RustDesk Client rustdesk-client en Windows, MacOS, Linux, iOS, Android (bucle de sincronización de latidos, módulos de procesamiento de estrategias) permite la Manipulación de Protocolo. Esta vulnerabilidad está asociada con los archivos de programa src/hbbs_http/sync.Rs y las rutinas de programa del gestor de detención de servicio en el bucle de latidos. Este problema afecta a RustDesk Client: hasta la versión 1.4.5.

05 Mar 2026, 19:16

Type Values Removed Values Added
References
  • () https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub -
  • () https://www.vulsec.org/ -

05 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-05 16:16

Updated : 2026-03-10 20:25


NVD link : CVE-2026-30798

Mitre link : CVE-2026-30798

CVE.ORG link : CVE-2026-30798


JSON object : View

Products Affected

rustdesk

  • rustdesk

google

  • android

microsoft

  • windows

apple

  • iphone_os
  • macos

linux

  • linux_kernel
CWE
CWE-345

Insufficient Verification of Data Authenticity

CWE-755

Improper Handling of Exceptional Conditions