CVE-2026-23564
Cleartext UDP Traffic Exposure in TeamViewer DEX Client Prior
Publication date: 2026-01-29
Last updated on: 2026-02-11
Assigner: TeamViewer Germany GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| teamviewer | digital_employee_experience | to 26.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-319 | The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in TeamViewer DEX Client's Content Distribution Service (NomadBranch.exe) prior to version 26.1 for Windows. It allows an attacker on the adjacent network to cause UDP traffic, which is normally encrypted, to be sent in cleartext. This means sensitive information that should be protected can be exposed to unauthorized parties.
How can this vulnerability impact me? :
The vulnerability can lead to the disclosure of sensitive information because encrypted UDP traffic is sent in cleartext. An attacker on the adjacent network could intercept this traffic and access confidential data, potentially leading to data breaches or unauthorized information disclosure.