CVE-2026-30796
Published: 05 March 2026
Summary
CVE-2026-30796 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Rustdesk Rustdesk Server. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 6.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Role-based training covers secure transmission methods, mitigating cleartext transmission of sensitive data.
By requiring documented security controls for information exchanges, the control reduces the risk of cleartext transmission of sensitive data.
Mapping transmission actions in data flows helps prevent cleartext transmission of sensitive information.
Settings can enforce secure transmission protocols to prevent cleartext transmission of sensitive data.
Policy addresses secure transport and handling of media to avoid cleartext transmission of sensitive information.
Enforces safeguards against cleartext transmission of CUI when data leaves organizational boundaries to external systems.
Explicit controls and continuous oversight on external system services prevent cleartext transmission of sensitive information over provider-managed channels.
Key-establishment procedures specify secure distribution channels that preclude cleartext transmission of key material.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Cleartext transmission of preset-address-book-password directly enables passive network sniffing to capture credentials (T1040).
NVD Description
Cleartext Transmission of Sensitive Information vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Address book sync API modules) allows Sniffing Attacks. This vulnerability is associated with program files Closed source — API endpoint handling heartbeat sync and…
more
program routines Heartbeat API handler (accepts preset-address-book-password in plaintext). This issue affects RustDesk Server Pro: through 1.7.5.
Deeper analysisAI
CVE-2026-30796 is a Cleartext Transmission of Sensitive Information vulnerability (CWE-319) in RustDesk Server Pro (rustdesk-server-pro) versions through 1.7.5, affecting deployments on Windows, macOS, and Linux. The flaw impacts the Address book sync API modules, particularly the closed-source API endpoint handling heartbeat sync and program routines. The Heartbeat API handler accepts the preset-address-book-password in plaintext, enabling sniffing attacks.
The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating network accessibility with low attack complexity, no privileges or user interaction required, and high confidentiality impact. Any attacker positioned to sniff network traffic between clients and the RustDesk Server Pro can intercept plaintext transmissions of the preset-address-book-password during heartbeat sync or address book synchronization operations.
Mitigation guidance and additional details are available in advisories at the following references: https://docs.google.com/document/d/e/2PACX-1vSds6jjpd38oO_yIAyd1HYtKNUuea-I-ozAPpGhYI7QgAU-QGJ7D8a4rOZVj1vmiUXV1EcdRHf9aZAW/pub, https://rustdesk.com/docs/en/, and https://www.vulsec.org/.
Details
- CWE(s)