A default installation of RustDesk 1.2.3 on Windows places a WDKTestCert certificate under Trusted Root Certification Authorities with Enhanced Key Usage of Code Signing (1.3.6.1.5.5.7.3.3), valid from 2023 until 2033. This is potentially unwanted, e.g., because there is no public documentation of security measures for the private key, and arbitrary software could be signed if the private key were to be compromised. NOTE: the vendor's position is "we do not have EV cert, so we use test cert as a workaround." Insertion into Trusted Root Certification Authorities was the originally intended behavior, and the UI ensured that the certificate installation step (checked by default) was visible to the user before proceeding with the product installation.
References
Link Resource
https://github.com/rustdesk/rustdesk/discussions/6444 Exploit Issue Tracking
https://news.ycombinator.com/item?id=39256493 Issue Tracking
https://serverfault.com/questions/837994 Issue Tracking Technical Description
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2024-02-06T00:00:00

Updated: 2024-02-06T08:21:43.197901

Reserved: 2024-02-06T00:00:00


Link: CVE-2024-25140

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2024-02-06T09:15:52.827

Modified: 2024-05-17T02:36:54.770


Link: CVE-2024-25140

JSON object: View

cve-icon Redhat Information

No data.

CWE