CVE-2025-36537

7.0 HIGH

📋 TL;DR

This vulnerability allows a local unprivileged user on Windows systems to delete arbitrary files with SYSTEM privileges by exploiting the MSI rollback mechanism in TeamViewer's Remote Management features. It affects TeamViewer Remote and Tensor versions prior to 15.67. Only users with local access to systems running vulnerable TeamViewer installations are affected.

💻 Affected Systems

Products:
  • TeamViewer Remote
  • TeamViewer Tensor
Versions: All versions prior to 15.67
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Remote Management features: Backup, Monitoring, and Patch Management. Standard TeamViewer remote control functionality is not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could delete critical system files, causing system instability, data loss, or complete system compromise by removing security controls or configuration files.

🟠

Likely Case

Local users could delete important files for disruption or data destruction, potentially affecting business operations or causing service outages.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to isolated incidents that could be quickly detected and contained.

🌐 Internet-Facing: LOW - This requires local access to the system; it cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Any local user (including low-privileged accounts) on affected systems can exploit this vulnerability to gain SYSTEM privileges for file deletion.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of MSI rollback mechanism exploitation. The vulnerability leverages Windows Installer rollback functionality to perform privileged file operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 15.67

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1002/

Restart Required: Yes

Instructions:

1. Download TeamViewer version 15.67 or later from the official website. 2. Run the installer with administrative privileges. 3. Follow the installation wizard. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Disable Remote Management Features

windows

Temporarily disable the vulnerable Remote Management features (Backup, Monitoring, Patch Management) until patching is possible.

Open TeamViewer → Extras → Options → Advanced → Show advanced options → Disable 'Backup', 'Monitoring', and 'Patch Management' features

Restrict Local User Access

windows

Implement strict local user access controls to prevent unauthorized users from accessing systems with vulnerable TeamViewer installations.

🧯 If You Can't Patch

  • Implement strict principle of least privilege for local user accounts
  • Enable detailed auditing and monitoring for file deletion events on systems with TeamViewer installed

🔍 How to Verify

Check if Vulnerable:

Check TeamViewer version in the application (Help → About TeamViewer) and verify if it's below 15.67.

Check Version:

wmic product where name='TeamViewer' get version

Verify Fix Applied:

After updating, verify the version is 15.67 or higher in Help → About TeamViewer.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unexpected file deletions by SYSTEM account
  • TeamViewer service logs showing abnormal MSI rollback operations
  • Security logs showing privilege escalation attempts

Network Indicators:

  • No network indicators - this is a local privilege escalation vulnerability

SIEM Query:

EventID=4663 OR EventID=4656 AND ObjectType='File' AND SubjectUserName='SYSTEM' AND ProcessName contains 'TeamViewer'

🔗 References

📤 Share & Export