CVE-2025-44016

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass file integrity validation in TeamViewer DEX Client's Content Distribution Service by providing a valid hash for a malicious file. This enables arbitrary code execution under the Nomad Branch service context, affecting Windows systems running vulnerable versions of TeamViewer DEX Client.

💻 Affected Systems

Products:
  • TeamViewer DEX Client (former 1E client) - Content Distribution Service
Versions: All versions prior to 25.11
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the NomadBranch.exe component of TeamViewer DEX Client on Windows systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution, allowing attackers to install malware, steal data, or pivot to other systems on the network.

🟠

Likely Case

Malicious file execution leading to ransomware deployment, credential theft, or backdoor installation on affected systems.

🟢

If Mitigated

Limited impact with proper network segmentation and endpoint protection blocking malicious payloads.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires ability to send crafted requests to the vulnerable service, but no authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.11 or later

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1005/

Restart Required: Yes

Instructions:

1. Download TeamViewer DEX Client version 25.11 or later from official sources. 2. Install the update following vendor instructions. 3. Restart affected systems to ensure the NomadBranch.exe service runs the patched version.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict network access to NomadBranch.exe service to only trusted management systems.

Use Windows Firewall: New-NetFirewallRule -DisplayName "Block NomadBranch" -Direction Inbound -Program "C:\Program Files\TeamViewer\NomadBranch.exe" -Action Block

Service Disablement

windows

Temporarily disable the Nomad Branch service if not critically needed.

sc stop NomadBranch
sc config NomadBranch start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running vulnerable versions from untrusted networks.
  • Deploy endpoint detection and response (EDR) solutions configured to block suspicious process execution from the NomadBranch.exe context.

🔍 How to Verify

Check if Vulnerable:

Check the version of TeamViewer DEX Client installed and verify if NomadBranch.exe version is prior to 25.11.

Check Version:

wmic product where name="TeamViewer DEX Client" get version

Verify Fix Applied:

Confirm TeamViewer DEX Client version is 25.11 or later and verify NomadBranch.exe file properties show the updated version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from NomadBranch.exe
  • Failed file validation events in TeamViewer logs
  • Suspicious network connections originating from NomadBranch.exe

Network Indicators:

  • Unusual inbound connections to NomadBranch.exe default ports
  • Anomalous outbound connections from systems running NomadBranch.exe

SIEM Query:

source="windows" AND process_name="NomadBranch.exe" AND (event_id=4688 OR event_id=4689) AND parent_process!="services.exe"

🔗 References

📤 Share & Export