TeamViewer DEX Command Injection Vulnerability

MEDIUM (6.8) No Patch (3 days)

Threat Intelligence

Low Risk
EPSS Score: 0.14% chance of exploitation (percentile: 34%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

TeamViewer DEX is a remote desktop protocol used by TeamViewer for secure remote access to computers. This vulnerability allows attackers with Actioner privileges to inject arbitrary commands on devices connected to the platform, potentially leading to remote execution of elevated commands and unauthorized access to sensitive data.

Am I affected?

You're affected if you use A command. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

Affected Products

TeamViewer / DEX

How to fix

To fix this vulnerability, upgrade to TeamViewer DEX version V21.1 or later. Alternatively, as a temporary measure:

  • Set DEX_LOGOFF_USER_INSTRUCTION environment variable to an empty string (DEX_LOGOFF_USER_INSTRUCTION="")
  • Disable the 1E-Explorer-TachyonCore-LogoffUser instruction in the TeamViewer DEX configuration file

References