This issue affects RustDesk Server: through 1.7.5, through 1.1.15.
Project Subscriptions
No data.
No advisories yet.
Solution
Implement Signed Session Authorization Tokens validated by hbbs and hbbr
Workaround
Restrict network access to hbbs/hbbr ports (21116, 21117) via firewall. Use strong passwords.
Thu, 05 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 05 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Missing Authorization, Missing Authentication for Critical Function vulnerability in rustdesk-server RustDesk Server rustdesk-server, rustdesk-server-pro on hbbs/hbbr on all server platforms (Rendezvous server (hbbs), relay server (hbbr) modules) allows Privilege Abuse. This vulnerability is associated with program files src/rendezvous_server.Rs, src/relay_server.Rs and program routines handle_punch_hole_request(), RegisterPeer handler, relay forwarding. This issue affects RustDesk Server: through 1.7.5, through 1.1.15. | |
| Title | RustDesk hbbs/hbbr Servers Broker Connections Without Any Authorization Check | |
| Weaknesses | CWE-306 CWE-862 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VULSec
Published:
Updated: 2026-03-05T17:03:15.491Z
Reserved: 2026-03-05T14:13:35.407Z
Link: CVE-2026-30784
No data.
Status : Awaiting Analysis
Published: 2026-03-05T16:16:19.110
Modified: 2026-03-05T19:38:33.877
Link: CVE-2026-30784
No data.
OpenCVE Enrichment
No data.