CVE-2025-64991
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-11
Assigner: TeamViewer Germany GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| teamviewer | teamviewer_dex | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a command injection flaw in TeamViewer DEX (formerly 1E DEX), specifically in the 1E-PatchInsights-Deploy instruction prior to version 15. It occurs due to improper input validation, allowing authenticated users with Actioner privileges to inject arbitrary commands. This enables remote execution of elevated commands on devices connected to the platform.
How can this vulnerability impact me? :
The vulnerability can allow an attacker with Actioner privileges to remotely execute elevated commands on connected devices. This could lead to unauthorized control, data compromise, or disruption of device operations within the affected environment.