A vulnerability in rustdesk-client RustDesk Client rustdesk-client on Windows, MacOS, Linux, iOS, Android, WebClient (Strategy sync, HTTP API client, config options engine modules) allows Application API Message Manipulation via Man-in-the-Middle. This vulnerability is associated with program files src/hbbs_http/sync.Rs, hbb_common/src/config.Rs and program routines Strategy merge loop in sync.Rs, Config::set_options().
This issue affects RustDesk Client: through 1.4.5.
Attack Parameters
Impact Assessment
CVSS Vector v4.0
Weakness Type (CWE)
Vulnerable Products 6
| Configuration | From (including) | Up to (excluding) |
|---|---|---|
|
Rustdesk Rustdesk
cpe:2.3:a:rustdesk:rustdesk:*:*:*:*:webclient:*:*:*
|
— |
<= 1.4.5
|
|
Apple Iphone_Os
cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*
|
— | — |
|
Apple Macos
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
|
— | — |
|
Google Android
cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
|
— | — |
|
Linux Linux_Kernel
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
|
— | — |
|
Microsoft Windows
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
|
— | — |