Cleartext Transmission of Sensitive Information vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Address book sync API modules) allows Sniffing Attacks. This vulnerability is associated with program files Closed source — API endpoint handling heartbeat sync and program routines Heartbeat API handler (accepts preset-address-book-password in plaintext).
This issue affects RustDesk Server Pro: through 1.7.5.
This issue affects RustDesk Server Pro: through 1.7.5.
Advisories
No advisories yet.
Fixes
Solution
Transition Address Book API to SRP (Secure Remote Password)
Workaround
Avoid setting address book passwords; use account-based access only
References
History
Thu, 05 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 05 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cleartext Transmission of Sensitive Information vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Address book sync API modules) allows Sniffing Attacks. This vulnerability is associated with program files Closed source — API endpoint handling heartbeat sync and program routines Heartbeat API handler (accepts preset-address-book-password in plaintext). This issue affects RustDesk Server Pro: through 1.7.5. | |
| Title | RustDesk Server Pro API Requires Address Book Password in Plaintext for Sync Protocol | |
| First Time appeared |
Rustdesk-server-pro
Rustdesk-server-pro rustdesk Server Pro |
|
| Weaknesses | CWE-319 | |
| CPEs | cpe:2.3:a:rustdesk-server-pro:rustdesk_server_pro:*:*:linux:*:*:*:*:* cpe:2.3:a:rustdesk-server-pro:rustdesk_server_pro:*:*:macos:*:*:*:*:* cpe:2.3:a:rustdesk-server-pro:rustdesk_server_pro:*:*:windows:*:*:*:*:* |
|
| Vendors & Products |
Rustdesk-server-pro
Rustdesk-server-pro rustdesk Server Pro |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VULSec
Published:
Updated: 2026-03-05T16:51:07.744Z
Reserved: 2026-03-05T14:13:37.203Z
Link: CVE-2026-30796
No data.
Status : Awaiting Analysis
Published: 2026-03-05T16:16:21.007
Modified: 2026-03-05T19:38:33.877
Link: CVE-2026-30796
No data.
OpenCVE Enrichment
No data.
Weaknesses