CVE-2026-30796

Published: Mar 05, 2026 Last Modified: Mar 05, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,7
Source: 2fdefc65-d750-4b8d-96ee-6e2c0c42dbfe
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A

Description

AI Translation Available

Cleartext Transmission of Sensitive Information vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Address book sync API modules) allows Sniffing Attacks. This vulnerability is associated with program files Closed source — API endpoint handling heartbeat sync and program routines Heartbeat API handler (accepts preset-address-book-password in plaintext).

This issue affects RustDesk Server Pro: through 1.7.5.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0003
Percentile
0,1th
Updated

EPSS Score Trend (Last 10 Days)

319

Cleartext Transmission of Sensitive Information

Draft
Common Consequences
Security Scopes Affected:
Integrity Confidentiality
Potential Impacts:
Read Application Data Modify Files Or Directories Other
Applicable Platforms
Technologies: Cloud Computing, ICS/OT, Mobile, Not Technology-Specific, System on Chip, Test/Debug Hardware
View CWE Details
https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozA…
https://rustdesk.com/docs/en/
https://www.vulsec.org/