This issue affects RustDesk Client: through 1.4.5.
No advisories yet.
Solution
Remove automatic fallback. Treat TLS handshake failures as fatal.
Workaround
Ensure network path to API server cannot be intercepted (VPN, direct link)
Thu, 05 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 05 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Certificate Validation vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (HTTP API client, TLS transport modules) allows Adversary in the Middle (AiTM). This vulnerability is associated with program files src/hbbs_http/http_client.Rs and program routines TLS retry with danger_accept_invalid_certs(true). This issue affects RustDesk Client: through 1.4.5. | |
| Title | RustDesk HTTP Client Silently Accepts Invalid TLS Certificates After Handshake Failure | |
| First Time appeared |
Rustdesk-client
Rustdesk-client rustdesk Client |
|
| Weaknesses | CWE-295 | |
| CPEs | cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:android:*:*:*:*:* cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:ios:*:*:*:*:* cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:linux:*:*:*:*:* cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:macos:*:*:*:*:* cpe:2.3:a:rustdesk-client:rustdesk_client:*:*:windows:*:*:*:*:* |
|
| Vendors & Products |
Rustdesk-client
Rustdesk-client rustdesk Client |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VULSec
Published:
Updated: 2026-03-05T16:46:27.411Z
Reserved: 2026-03-05T14:13:37.203Z
Link: CVE-2026-30794
Updated: 2026-03-05T16:35:54.307Z
Status : Awaiting Analysis
Published: 2026-03-05T16:16:20.177
Modified: 2026-03-05T19:38:33.877
Link: CVE-2026-30794
No data.
OpenCVE Enrichment
No data.