CVE-2025-64990
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-11
Assigner: TeamViewer Germany GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| teamviewer | teamviewer_dex | 21.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a command injection flaw in TeamViewer DEX, specifically in the 1E-Explorer-TachyonCore-LogoffUser instruction before version 21.1. It occurs due to improper input validation, allowing authenticated users with Actioner privileges to inject arbitrary commands. This enables them to execute elevated commands remotely on devices connected to the platform.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with Actioner privileges to remotely execute elevated commands on connected devices. This could lead to unauthorized control, data manipulation, or disruption of services on those devices.