Use of a Broken or Risky Cryptographic Algorithm vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Config string generation, web console export modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program routines Config export/generation routines.
This issue affects RustDesk Server Pro: through 1.7.5.
This issue affects RustDesk Server Pro: through 1.7.5.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
Implement AES-256-GCM AEAD or equivalent authenticated encryption
Workaround
Treat config strings as public; restrict distribution to trusted channels only
References
| Link | Providers |
|---|---|
| https://rustdesk.com/docs/en/client/ |
|
History
Thu, 05 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Use of a Broken or Risky Cryptographic Algorithm vulnerability in rustdesk-server-pro RustDesk Server Pro rustdesk-server-pro on Windows, MacOS, Linux (Config string generation, web console export modules) allows Retrieve Embedded Sensitive Data. This vulnerability is associated with program routines Config export/generation routines. This issue affects RustDesk Server Pro: through 1.7.5. | |
| Title | RustDesk Server Generates Config Strings Using Reversible Encoding (Base64 + Reverse) Instead of Encryption | |
| First Time appeared |
Rustdesk-server-pro
Rustdesk-server-pro rustdesk Server Pro |
|
| Weaknesses | CWE-327 CWE-684 |
|
| CPEs | cpe:2.3:a:rustdesk-server-pro:rustdesk_server_pro:*:*:linux:*:*:*:*:* cpe:2.3:a:rustdesk-server-pro:rustdesk_server_pro:*:*:macos:*:*:*:*:* cpe:2.3:a:rustdesk-server-pro:rustdesk_server_pro:*:*:windows:*:*:*:*:* |
|
| Vendors & Products |
Rustdesk-server-pro
Rustdesk-server-pro rustdesk Server Pro |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VULSec
Published:
Updated: 2026-03-05T14:46:20.351Z
Reserved: 2026-03-05T13:26:50.447Z
Link: CVE-2026-3598
No data.
Status : Received
Published: 2026-03-05T15:16:15.167
Modified: 2026-03-05T15:16:15.167
Link: CVE-2026-3598
No data.
OpenCVE Enrichment
No data.