CVE-2026-23570
Improper Validation in TeamViewer NomadBranch.exe Allows Log Forgery
Publication date: 2026-01-29
Last updated on: 2026-02-11
Assigner: TeamViewer Germany GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| teamviewer | digital_employee_experience | to 26.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is due to a missing validation of a user-controlled value in the TeamViewer DEX Client's Content Distribution Service (NomadBranch.exe) before version 26.1 for Windows. An attacker on an adjacent network can exploit this by sending a crafted UDP Sync command to tamper with log timestamps, causing forged or nonsensical datetime prefixes in the logs.
How can this vulnerability impact me? :
The vulnerability can impact you by compromising the integrity of log files. An attacker can manipulate log timestamps, which may lead to incorrect or misleading log data, affecting forensic investigations and the ability to accurately correlate events.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows tampering with log timestamps, which compromises log integrity and forensic correlation. This could negatively impact compliance with standards and regulations such as GDPR and HIPAA that require accurate and reliable logging for audit and forensic purposes.