CVE-2026-8381
Broken Access Control in TeamViewer DEX Platform
Publication date: 2026-05-22
Last updated on: 2026-05-22
Assigner: TeamViewer Germany GmbH
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| teamviewer | dex_platform | to 9.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a broken access control issue in the TeamViewer DEX Platform (On-Premises) versions prior to 9.2. It occurs because certain backend API endpoints do not properly enforce authorization checks.
As a result, an authenticated user with low privileges can perform actions and access resources that should only be available to users with higher privileges.
An attacker who has low-privileged credentials can exploit this flaw to gain unauthorized access to administrative or sensitive functions.
How can this vulnerability impact me? :
This vulnerability can allow an attacker with low-level access to escalate their privileges and access administrative or sensitive features that they should not be able to use.
Such unauthorized access can lead to potential data exposure, unauthorized changes, or misuse of administrative functions, which can compromise the security and integrity of the affected system.