CVE-2024-25140

A default installation of RustDesk 1.2.3 on Windows places a WDKTestCert certificate under Trusted Root Certification Authorities with Enhanced Key Usage of Code Signing (1.3.6.1.5.5.7.3.3), valid from 2023 until 2033. This is potentially unwanted, e.g., because there is no public documentation of security measures for the private key, and arbitrary software could be signed if the private key were to be compromised. NOTE: the vendor's position is "we do not have EV cert, so we use test cert as a workaround." Insertion into Trusted Root Certification Authorities was the originally intended behavior, and the UI ensured that the certificate installation step (checked by default) was visible to the user before proceeding with the product installation.
References
Link Resource
https://github.com/rustdesk/rustdesk/discussions/6444 Exploit Issue Tracking
https://news.ycombinator.com/item?id=39256493 Issue Tracking
https://serverfault.com/questions/837994 Issue Tracking Technical Description
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:rustdesk:rustdesk:1.2.3:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

14 Feb 2024, 00:26

Type Values Removed Values Added
References () https://github.com/rustdesk/rustdesk/discussions/6444 - () https://github.com/rustdesk/rustdesk/discussions/6444 - Exploit, Issue Tracking
References () https://news.ycombinator.com/item?id=39256493 - () https://news.ycombinator.com/item?id=39256493 - Issue Tracking
References () https://serverfault.com/questions/837994 - () https://serverfault.com/questions/837994 - Issue Tracking, Technical Description
First Time Microsoft windows
Rustdesk rustdesk
Rustdesk
Microsoft
CWE CWE-295
CPE cpe:2.3:a:rustdesk:rustdesk:1.2.3:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

06 Feb 2024, 13:53

Type Values Removed Values Added
Summary
  • (es) Una instalación predeterminada de RustDesk 1.2.3 en Windows coloca un certificado WDKTestCert bajo Autoridades de certificación raíz confiables con uso de clave mejorado de firma de código (1.3.6.1.5.5.7.3.3), válido desde 2023 hasta 2033. Esto es potencialmente no deseado, por ejemplo , porque no existe documentación pública sobre las medidas de seguridad para la clave privada, y se podría firmar software arbitrario si la clave privada se viera comprometida. NOTA: la posición del proveedor es "no tenemos un certificado EV, por lo que utilizamos el certificado de prueba como workaround". La inserción en autoridades de certificación raíz de confianza era el comportamiento previsto originalmente y la interfaz de usuario garantizaba que el paso de instalación del certificado (marcado de forma predeterminada) fuera visible para el usuario antes de continuar con la instalación del producto.

06 Feb 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-06 09:15

Updated : 2024-04-11 01:24


NVD link : CVE-2024-25140

Mitre link : CVE-2024-25140

CVE.ORG link : CVE-2024-25140


JSON object : View

Products Affected

rustdesk

  • rustdesk

microsoft

  • windows
CWE
CWE-295

Improper Certificate Validation