CVE-2026-30795
Published: 05 March 2026
Summary
CVE-2026-30795 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Rustdesk Rustdesk. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 6.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Role-based training covers secure transmission methods, mitigating cleartext transmission of sensitive data.
By requiring documented security controls for information exchanges, the control reduces the risk of cleartext transmission of sensitive data.
Mapping transmission actions in data flows helps prevent cleartext transmission of sensitive information.
Settings can enforce secure transmission protocols to prevent cleartext transmission of sensitive data.
Policy addresses secure transport and handling of media to avoid cleartext transmission of sensitive information.
Enforces safeguards against cleartext transmission of CUI when data leaves organizational boundaries to external systems.
Explicit controls and continuous oversight on external system services prevent cleartext transmission of sensitive information over provider-managed channels.
Key-establishment procedures specify secure distribution channels that preclude cleartext transmission of key material.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Cleartext transmission of credentials (passwords) in heartbeat JSON payloads directly enables passive network sniffing to capture authentication material (T1040).
NVD Description
Cleartext Transmission of Sensitive Information vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android (Heartbeat sync loop modules) allows Sniffing Attacks. This vulnerability is associated with program files src/hbbs_http/sync.Rs and program routines Heartbeat JSON payload construction (preset-address-book-password).…
more
This issue affects RustDesk Client: through 1.4.5.
Deeper analysisAI
CVE-2026-30795 is a Cleartext Transmission of Sensitive Information vulnerability (CWE-319) in the RustDesk Client (rustdesk-client), affecting versions through 1.4.5 on Windows, macOS, Linux, iOS, and Android. The flaw occurs in the Heartbeat sync loop modules, specifically within the program file src/hbbs_http/sync.rs and the Heartbeat JSON payload construction routines involving the preset-address-book-password, enabling sniffing attacks on transmitted data.
The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating it can be exploited remotely over the network with low complexity, no privileges, and no user interaction. Unauthenticated attackers positioned to sniff network traffic can intercept cleartext sensitive information, such as passwords embedded in heartbeat JSON payloads, leading to high confidentiality impact without affecting integrity or availability.
Advisories and patch information are available in the referenced sources, including a detailed pub document at https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub, the RustDesk GitHub repository at https://github.com/rustdesk/rustdesk, and https://www.vulsec.org/. Security practitioners should review these for upgrade guidance to versions beyond 1.4.5 and any interim mitigations.
Details
- CWE(s)