CVE-2026-2490

5.5 MEDIUM

📋 TL;DR

This vulnerability in RustDesk Client for Windows allows local attackers with low-privileged code execution to read arbitrary files on the system by exploiting symbolic link handling in the Transfer File feature. The attack can disclose sensitive information with SYSTEM-level privileges. Only Windows installations of RustDesk Client are affected.

💻 Affected Systems

Products:
  • RustDesk Client for Windows
Versions: Versions prior to the fix in PR #13736
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows clients when Transfer File feature is used. Requires local attacker with ability to execute low-privileged code first.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through disclosure of sensitive files like SAM database, configuration files, or credentials, potentially leading to privilege escalation or lateral movement.

🟠

Likely Case

Local information disclosure of user files, configuration data, or temporary files that could contain sensitive information.

🟢

If Mitigated

Limited impact with proper access controls and monitoring in place, restricting low-privileged code execution opportunities.

🌐 Internet-Facing: LOW - Requires local access and low-privileged code execution first.
🏢 Internal Only: MEDIUM - Internal attackers with initial access could leverage this for privilege escalation or data exfiltration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to execute code first. Symbolic link manipulation is well-understood technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version containing fix from PR #13736

Vendor Advisory: https://github.com/rustdesk/rustdesk/pull/13736

Restart Required: Yes

Instructions:

1. Update RustDesk Client to latest version. 2. Verify version includes fix from PR #13736. 3. Restart RustDesk service/application.

🔧 Temporary Workarounds

Disable Transfer File Feature

windows

Temporarily disable the Transfer File functionality to prevent exploitation

Configure RustDesk settings to disable file transfer capabilities

Restrict Symbolic Link Creation

windows

Apply Windows policies to restrict symbolic link creation for low-privileged users

Use Group Policy: Computer Configuration > Windows Settings > Security Settings > Local Policies > User Rights Assignment > Create symbolic links

🧯 If You Can't Patch

  • Implement strict access controls to prevent low-privileged code execution on systems
  • Monitor for suspicious file access patterns and symbolic link creation activities

🔍 How to Verify

Check if Vulnerable:

Check RustDesk version - if prior to fix in PR #13736, system is vulnerable

Check Version:

Check RustDesk About dialog or installed program version in Windows

Verify Fix Applied:

Verify RustDesk version includes changes from PR #13736 and test Transfer File feature with symbolic links

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns through RustDesk
  • Multiple failed file transfer attempts
  • Symbolic link creation in temporary directories

Network Indicators:

  • Unexpected file transfer traffic from RustDesk clients

SIEM Query:

Process:rustdesk.exe AND (FileAccess:* OR NetworkConnection:*)

🔗 References

📤 Share & Export