Vulnerability Description
A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options(). This issue affects RustDesk Client: through 1.4.5.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rustdesk | Rustdesk | <= 1.4.5 |
| Apple | Iphone Os | - |
| Apple | Macos | - |
| Android | - | |
| Linux | Linux Kernel | - |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPExploitThird Party Advisory
- https://rustdesk.com/docs/en/self-host/client-configuration/advanced-settings/ProductVendor Advisory
- https://www.vulsec.org/Not Applicable
FAQ
What is CVE-2026-30792?
CVE-2026-30792 is a vulnerability with a CVSS score of 8.1 (HIGH). A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application ...
How severe is CVE-2026-30792?
CVE-2026-30792 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-30792?
Check the references section above for vendor advisories and patch information. Affected products include: Rustdesk Rustdesk, Apple Iphone Os, Apple Macos, Google Android, Linux Linux Kernel.