CVE-2025-64995
BaseFortify
Publication date: 2025-12-11
Last updated on: 2025-12-11
Assigner: TeamViewer Germany GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| teamviewer | teamviewer_dex | 3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a privilege escalation issue in TeamViewer DEX (formerly 1E DEX) affecting versions prior to V3.4. It occurs in the 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction, where improper protection of the execution path on the local device allows an attacker with local access to hijack the process and execute arbitrary code with SYSTEM-level privileges.
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker with local access to the device to gain SYSTEM-level privileges by hijacking the execution process. This means the attacker can execute arbitrary code with the highest level of system permissions, potentially leading to full control over the affected system, unauthorized data access, or disruption of system operations.