Lucene search

K
cve[email protected]CVE-2024-25140
HistoryFeb 06, 2024 - 9:15 a.m.

CVE-2024-25140

2024-02-0609:15:52
CWE-295
web.nvd.nist.gov
35
rustdesk
windows
wdktestcert
code signing
certificate
security
vulnerability
compromise
trusted root certification authorities
installation
cve-2024-25140

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.4%

A default installation of RustDesk 1.2.3 on Windows places a WDKTestCert certificate under Trusted Root Certification Authorities with Enhanced Key Usage of Code Signing (1.3.6.1.5.5.7.3.3), valid from 2023 until 2033. This is potentially unwanted, e.g., because there is no public documentation of security measures for the private key, and arbitrary software could be signed if the private key were to be compromised. NOTE: the vendor’s position is “we do not have EV cert, so we use test cert as a workaround.” Insertion into Trusted Root Certification Authorities was the originally intended behavior, and the UI ensured that the certificate installation step (checked by default) was visible to the user before proceeding with the product installation.

Affected configurations

NVD
Node
rustdeskrustdeskMatch1.2.3
AND
microsoftwindowsMatch-
CPENameOperatorVersion
rustdesk:rustdeskrustdeskeq1.2.3

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.4%

Related for CVE-2024-25140