CVE-2024-7481

8.8 HIGH

📋 TL;DR

This vulnerability allows an attacker with local unprivileged access on a Windows system to bypass cryptographic signature verification during printer driver installation via TeamViewer_service.exe, enabling privilege escalation to SYSTEM level. It affects TeamViewer Remote Clients for Windows prior to version 15.58.4.

💻 Affected Systems

Products:
  • TeamViewer Remote Client for Windows
Versions: All versions prior to 15.58.4
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires TeamViewer_service.exe component and local unprivileged access; TeamViewer must be installed and running.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full SYSTEM privilege compromise allowing complete control of the Windows system, installation of malicious drivers, persistence mechanisms, and lateral movement.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM privileges, enabling installation of malicious software, credential theft, and bypassing security controls.

🟢

If Mitigated

Limited impact if proper endpoint protection, application whitelisting, and least privilege principles are enforced, though the vulnerability still provides a path to SYSTEM access.

🌐 Internet-Facing: LOW - This requires local access to the system; it is not directly exploitable over the internet.
🏢 Internal Only: HIGH - Attackers with initial access to a Windows workstation (via phishing, malware, or physical access) can escalate to SYSTEM privileges and compromise the entire system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once initial access is obtained; no public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.58.4 and later

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1006/

Restart Required: Yes

Instructions:

1. Open TeamViewer. 2. Go to Help > Check for new version. 3. Follow prompts to update to version 15.58.4 or later. 4. Restart the system after installation.

🔧 Temporary Workarounds

Disable TeamViewer Service

windows

Stop and disable the TeamViewer_service.exe service to prevent exploitation, but this will break TeamViewer functionality.

sc stop TeamViewer
sc config TeamViewer start= disabled

Restrict Local Access

all

Implement strict access controls to prevent unauthorized local access to Windows systems.

🧯 If You Can't Patch

  • Remove TeamViewer from affected systems entirely if not required for business operations.
  • Implement application whitelisting to block execution of unauthorized drivers and TeamViewer_service.exe modifications.

🔍 How to Verify

Check if Vulnerable:

Check TeamViewer version in the application (Help > About) or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\TeamViewer\Version.

Check Version:

reg query "HKLM\SOFTWARE\TeamViewer" /v Version

Verify Fix Applied:

Confirm TeamViewer version is 15.58.4 or higher using the same methods as checking vulnerability.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Look for Event ID 7045 (Service installed) or 4697 (Service installed) related to TeamViewer or unknown drivers.
  • TeamViewer logs: Unusual driver installation attempts or service modifications.

Network Indicators:

  • No direct network indicators; this is a local privilege escalation vulnerability.

SIEM Query:

EventID=7045 OR EventID=4697 | where ServiceName contains "TeamViewer" or ImagePath contains suspicious driver paths

🔗 References

📤 Share & Export