CVE-2026-0747
Sensitive Information Exposure in Devolutions RDM TeamViewer Dashboard
Publication date: 2026-01-08
Last updated on: 2026-01-08
Assigner: Devolutions Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| devolutions | remote_desktop_manager | From 2025.3.24.0 (inc) to 2025.3.28.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in the TeamViewer entry dashboard component of Devolutions Remote Desktop Manager versions 2025.3.24.0 through 2025.3.28.0 on Windows. It involves a defective password masking feature that exposes sensitive information by allowing an external observer to see passwords on screen. This exposure can occur during physical observation or screen sharing. [1]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized disclosure of passwords if someone physically observes your screen or views it via screen sharing. This exposure of sensitive credentials could potentially allow attackers or unauthorized individuals to gain access to systems or accounts protected by those passwords. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by identifying if your system is running Devolutions Remote Desktop Manager versions 2025.3.24.0 through 2025.3.28.0 on Windows. There are no specific commands provided to detect the defective password masking feature or exposure on screen. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately upgrade Devolutions Remote Desktop Manager to version 2025.3.29.0 or higher. [1]