A default installation of RustDesk 1.2.3 on Windows places a WDKTestCert certificate under Trusted Root Certification Authorities with Enhanced Key Usage of Code Signing (1.3.6.1.5.5.7.3.3), valid from 2023 until 2033. This is potentially unwanted, e.g., because there is no public documentation of security measures for the private key, and arbitrary software could be signed if the private key were to be compromised. NOTE: the vendor's position is "we do not have EV cert, so we use test cert as a workaround." Insertion into Trusted Root Certification Authorities was the originally intended behavior, and the UI ensured that the certificate installation step (checked by default) was visible to the user before proceeding with the product installation.
References
Link | Resource |
---|---|
https://github.com/rustdesk/rustdesk/discussions/6444 | Exploit Issue Tracking |
https://news.ycombinator.com/item?id=39256493 | Issue Tracking |
https://serverfault.com/questions/837994 | Issue Tracking Technical Description |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2024-02-06T00:00:00
Updated: 2024-02-06T08:21:43.197901
Reserved: 2024-02-06T00:00:00
Link: CVE-2024-25140
JSON object: View
NVD Information
Status : Modified
Published: 2024-02-06T09:15:52.827
Modified: 2024-05-17T02:36:54.770
Link: CVE-2024-25140
JSON object: View
Redhat Information
No data.
CWE