CVE-2026-30791
HIGH
8,7
Source: 2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
Description
AI Translation Available
Use of a Broken or Risky Cryptographic Algorithm vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Config import, URI scheme handler, CLI --config modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program files flutter/lib/common.Dart, hbb_common/src/config.Rs and program routines parseRustdeskUri(), importConfig().
This issue affects RustDesk Client: through 1.4.5.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0003
Percentile
0,1th
Updated
EPSS Score Trend (Last 11 Days)
327
Use of a Broken or Risky Cryptographic Algorithm
DraftCommon Consequences
Security Scopes Affected:
Confidentiality
Integrity
Accountability
Non-Repudiation
Potential Impacts:
Read Application Data
Modify Application Data
Hide Activities
Applicable Platforms
Languages:
Not Language-Specific, Verilog, VHDL
Technologies:
ICS/OT, Not Technology-Specific
684
Incorrect Provision of Specified Functionality
DraftCommon Consequences
Security Scopes Affected:
Other
Potential Impacts:
Quality Degradation
Applicable Platforms
All platforms may be affected
https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozA…
https://rustdesk.com/docs/en/client/
https://www.vulsec.org/