Improper Restriction of Excessive Authentication Attempts, Use of Password Hash With Insufficient Computational Effort vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Peer authentication, API login modules), rustdesk-server RustDesk Server (OSS) rustdesk-server on Windows, MacOS, Linux (Peer authentication, API login modules) allows Password Brute Forcing. This vulnerability is associated with program files src/server/connection.Rs and program routines Salt/challenge generation, SHA256(SHA256(pwd+salt)+challenge) verification.
This issue affects RustDesk Server Pro: through 1.7.5; RustDesk Server (OSS): through 1.1.15.
Attack Parameters
Impact Assessment
CVSS Vector v4.0
Vulnerable Products 8
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Rustdesk Rustdesk_Server
cpe:2.3:a:rustdesk:rustdesk_server:*:*:*:*:pro:*:*:*
|
— |
<= 1.7.5
|
|
Apple Macos
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
|
— | — |
|
Linux Linux_Kernel
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
|
— | — |
|
Microsoft Windows
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
|
— | — |
|
Rustdesk Rustdesk_Server
cpe:2.3:a:rustdesk:rustdesk_server:*:*:*:*:oss:*:*:*
|
— |
<= 1.1.15
|
|
Apple Macos
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
|
— | — |
|
Linux Linux_Kernel
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
|
— | — |
|
Microsoft Windows
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
|
— | — |