Description
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'), Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk, hbb_common on Windows, MacOS, Linux (Password security module, config encryption, machine UID modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files hbb_common/src/password_security.Rs, hbb_common/src/config.Rs, hbb_common/src/lib.Rs (get_uuid), machine-uid/src/lib.Rs and program routines symmetric_crypt(), encrypt_str_or_original(), decrypt_str_or_original(), get_uuid(), get_machine_id(). This issue affects RustDesk Client: through 1.4.5.
INFO
Published Date :
2026-03-05T16:04:36.443Z
Last Modified :
2026-03-06T10:32:38.348Z
Source :
VULSec
AFFECTED PRODUCTS
The following products are affected by CVE-2026-30785 vulnerability.
| Vendors | Products |
|---|---|
| Rustdesk-client |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-30785.