CVE-2025-44016
📋 TL;DR
This vulnerability allows attackers to bypass file integrity validation in TeamViewer DEX Client's Content Distribution Service by providing a valid hash for a malicious file. This enables arbitrary code execution under the Nomad Branch service context, affecting Windows systems running vulnerable versions of TeamViewer DEX Client.
💻 Affected Systems
- TeamViewer DEX Client (former 1E client) - Content Distribution Service
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise via remote code execution, allowing attackers to install malware, steal data, or pivot to other systems on the network.
Likely Case
Malicious file execution leading to ransomware deployment, credential theft, or backdoor installation on affected systems.
If Mitigated
Limited impact with proper network segmentation and endpoint protection blocking malicious payloads.
🎯 Exploit Status
Requires ability to send crafted requests to the vulnerable service, but no authentication is needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 25.11 or later
Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1005/
Restart Required: Yes
Instructions:
1. Download TeamViewer DEX Client version 25.11 or later from official sources. 2. Install the update following vendor instructions. 3. Restart affected systems to ensure the NomadBranch.exe service runs the patched version.
🔧 Temporary Workarounds
Network Segmentation
windowsRestrict network access to NomadBranch.exe service to only trusted management systems.
Use Windows Firewall: New-NetFirewallRule -DisplayName "Block NomadBranch" -Direction Inbound -Program "C:\Program Files\TeamViewer\NomadBranch.exe" -Action Block
Service Disablement
windowsTemporarily disable the Nomad Branch service if not critically needed.
sc stop NomadBranch
sc config NomadBranch start= disabled
🧯 If You Can't Patch
- Implement strict network segmentation to isolate systems running vulnerable versions from untrusted networks.
- Deploy endpoint detection and response (EDR) solutions configured to block suspicious process execution from the NomadBranch.exe context.
🔍 How to Verify
Check if Vulnerable:
Check the version of TeamViewer DEX Client installed and verify if NomadBranch.exe version is prior to 25.11.
Check Version:
wmic product where name="TeamViewer DEX Client" get version
Verify Fix Applied:
Confirm TeamViewer DEX Client version is 25.11 or later and verify NomadBranch.exe file properties show the updated version.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from NomadBranch.exe
- Failed file validation events in TeamViewer logs
- Suspicious network connections originating from NomadBranch.exe
Network Indicators:
- Unusual inbound connections to NomadBranch.exe default ports
- Anomalous outbound connections from systems running NomadBranch.exe
SIEM Query:
source="windows" AND process_name="NomadBranch.exe" AND (event_id=4688 OR event_id=4689) AND parent_process!="services.exe"