CVE-2026-8381
Received Received - Intake
Broken Access Control in TeamViewer DEX Platform

Publication date: 2026-05-22

Last updated on: 2026-05-22

Assigner: TeamViewer Germany GmbH

Description
A broken access control vulnerability exists in the TeamViewer DEX Platform (On‑Premises) prior version 9.2. Certain backend API endpoints do not correctly enforce authorization checks, allowing an authenticated user with low privileges to perform actions and access resources intended only for higher‑privileged roles. An attacker with low‑privileged credentials may exploit this to gain unauthorized access to administrative or sensitive functionality.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-22
Last Modified
2026-05-22
Generated
2026-05-22
AI Q&A
2026-05-22
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
teamviewer dex_platform to 9.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a broken access control issue in the TeamViewer DEX Platform (On-Premises) versions prior to 9.2. It occurs because certain backend API endpoints do not properly enforce authorization checks.

As a result, an authenticated user with low privileges can perform actions and access resources that should only be available to users with higher privileges.

An attacker who has low-privileged credentials can exploit this flaw to gain unauthorized access to administrative or sensitive functions.


How can this vulnerability impact me? :

This vulnerability can allow an attacker with low-level access to escalate their privileges and access administrative or sensitive features that they should not be able to use.

Such unauthorized access can lead to potential data exposure, unauthorized changes, or misuse of administrative functions, which can compromise the security and integrity of the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart