TL;DR

Vulnerability in RustDesk allows local disclosure of sensitive data on affected systems, rated CVSS 5.5.

What happened

['Sensitive information disclosure in RustDesk due to improper handling of file links']

Why it matters for ops

['Local attackers can obtain low-privilege code execution and exploit the vulnerability']

Mitigation

  • Update to the latest version of RustDesk with patches applied
  • Limit user privileges to prevent unauthorized code execution

Action items

  • Review system configurations and security policies
  • Apply software updates from trusted sources promptly

Detection IOCs

  • Unexpected access attempts to sensitive directories or files
  • Increased network traffic related to file transfers

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-117/