CVE-2024-25140

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-25140
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-25140.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-25140
Published
2024-02-06T09:15:52.827Z
Modified
2025-11-15T15:41:05.343962Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A default installation of RustDesk 1.2.3 on Windows places a WDKTestCert certificate under Trusted Root Certification Authorities with Enhanced Key Usage of Code Signing (1.3.6.1.5.5.7.3.3), valid from 2023 until 2033. This is potentially unwanted, e.g., because there is no public documentation of security measures for the private key, and arbitrary software could be signed if the private key were to be compromised. NOTE: the vendor's position is "we do not have EV cert, so we use test cert as a workaround." Insertion into Trusted Root Certification Authorities was the originally intended behavior, and the UI ensured that the certificate installation step (checked by default) was visible to the user before proceeding with the product installation.

Database specific
{
    "isDisputed": true
}
References

Affected packages

Git / github.com/rustdesk/rustdesk

Affected ranges

Type
GIT
Repo
https://github.com/rustdesk/rustdesk
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

1.*

1.1.3
1.1.4
1.1.5
1.1.6
1.1.8
1.1.9
1.2.0
1.2.1
1.2.2
1.2.3