TeamViewer DEX Command Injection Vulnerability

MEDIUM (6.8) No Patch (3 days)

Threat Intelligence

Low Risk
EPSS Score: 0.14% chance of exploitation (percentile: 34%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

TeamViewer DEX is a remote desktop management software used to manage and control devices connected to the platform. This vulnerability allows authenticated attackers with Actioner privileges to inject arbitrary commands on devices connected to the platform, potentially leading to unauthorized access to sensitive data or elevated system execution.

Am I affected?

You're affected if you use A command. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

Affected Products

TeamViewer GmbH / TeamViewer DEX

How to fix

  1. Upgrade to TeamViewer DEX version 1.15.0.1 or later from the official TeamViewer website: https://www.teamviewer.com/en/downloads.
  2. Immediate mitigations:
  3. Restrict network access to your TV Dex instance (firewall it from the public internet)
  4. Audit admin account activity for suspicious access patterns
  5. Monitor for unauthorized token creation

References