Description

Authentication Bypass by Capture-replay, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Client login, peer authentication modules) allows Reusing Session IDs (aka Session Replay). This vulnerability is associated with program files src/client.Rs and program routines hash_password(), login proof construction. This issue affects RustDesk Client: through 1.4.5.

INFO

Published Date :

2026-03-05T15:41:51.417Z

Last Modified :

2026-03-17T14:32:45.784Z

Source :

VULSec
AFFECTED PRODUCTS

The following products are affected by CVE-2026-30789 vulnerability.

Vendors Products
Apple
  • Iphone Os
  • Macos
Google
  • Android
Linux
  • Linux Kernel
Microsoft
  • Windows
Rustdesk
  • Rustdesk
Rustdesk-client
  • Rustdesk Client
REFERENCES

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact