CVE-2025-44016
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-11
Assigner: TeamViewer Germany GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| teamviewer | teamviewer_dex_client | 25.11 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in TeamViewer DEX Client's Content Distribution Service allows attackers to bypass file integrity validation by submitting a crafted request with a valid hash for a malicious file. This causes the service to mistakenly trust and process the malicious file, enabling arbitrary code execution within the Nomad Branch service context.
How can this vulnerability impact me? :
The vulnerability can lead to arbitrary code execution under the Nomad Branch service context, which may allow attackers to execute malicious code on the affected system, potentially leading to system compromise, data loss, or unauthorized access.