TeamViewer DEX Command Injection

MEDIUM (6.8) No Patch (3 days)

Threat Intelligence

Low Risk
EPSS Score: 0.14% chance of exploitation (percentile: 34%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

TeamViewer DEX is a remote management and support tool used by organizations to manage their devices. It's part of the TeamViewer suite, which allows administrators to remotely access and control devices. The vulnerability discovered in this CVE affects the 1E-PatchInsights-Deploy instruction prior version V15, allowing authenticated attackers with Actioner privileges to inject arbitrary commands.

Am I affected?

You're affected if you use A command. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

Affected Products

TeamViewer GmbH / TeamViewer DEX

How to fix

Concrete steps:

  1. Upgrade to TeamViewer DEX version V15 or later: https://www.teamviewer.com/en/downloads/
  2. Immediate mitigations:
    • Restrict network access to your TVDEX instance (firewall it from the public internet)
    • Audit admin account activity for suspicious access patterns
    • Monitor for unauthorized token creation

References