CVE-2026-30794 PUBLISHED

RustDesk HTTP Client Silently Accepts Invalid TLS Certificates After Handshake Failure

Assigner: VULSec
Reserved: 05.03.2026 Published: 05.03.2026 Updated: 05.03.2026

Improper Certificate Validation vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (HTTP API client, TLS transport modules) allows Adversary in the Middle (AiTM). This vulnerability is associated with program files src/hbbs_http/http_client.Rs and program routines TLS retry with danger_accept_invalid_certs(true).

This issue affects RustDesk Client: through 1.4.5.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 9.1

Product Status

Vendor rustdesk-client
Product RustDesk Client
Versions Default: affected
  • affected from 0 to 1.4.5 (incl.)

Affected Configurations

Default — any client connecting to API server via HTTPS

Exploits

PoC available. Trivially exploitable.

Workarounds

Ensure network path to API server cannot be intercepted (VPN, direct link)

Solutions

Remove automatic fallback. Treat TLS handshake failures as fatal.

Credits

  • Erez Kalman finder
  • Erez Kalman reporter

References

Problem Types

  • CWE-295 Improper Certificate Validation CWE

Impacts

  • CAPEC-94 Adversary in the Middle (AiTM)