CVE-2025-46266

4.3 MEDIUM

📋 TL;DR

This vulnerability in TeamViewer DEX Client's Content Distribution Service allows attackers to redirect the service to send data to arbitrary internal IP addresses, potentially exposing sensitive information. It affects Windows systems running TeamViewer DEX Client (formerly 1E Client) versions prior to 25.11. The risk is primarily internal to networks where the service operates.

💻 Affected Systems

Products:
  • TeamViewer DEX Client (formerly 1E Client)
Versions: All versions prior to 25.11
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Content Distribution Service component (NomadBranch.exe) on Windows systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive configuration data, credentials, or deployment information could be exfiltrated to attacker-controlled internal systems, enabling lateral movement or further attacks.

🟠

Likely Case

Limited information disclosure of service configuration or deployment data to internal systems, potentially revealing network topology or service details.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to non-sensitive data or prevented entirely.

🌐 Internet-Facing: LOW - The service typically operates internally and requires network access to exploit.
🏢 Internal Only: MEDIUM - Attackers with internal network access could redirect data flows to capture sensitive information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires internal network access and ability to interact with the service. No public exploit code is available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 25.11 or later

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1005/

Restart Required: Yes

Instructions:

1. Download TeamViewer DEX Client version 25.11 or later from official sources. 2. Install the update following standard deployment procedures. 3. Restart affected systems to ensure the updated service is running.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict network access to the Content Distribution Service to only necessary systems using firewall rules.

Service Hardening

windows

Configure the service to run with minimal privileges and restrict its network communication capabilities.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Content Distribution Service from untrusted systems
  • Monitor network traffic from NomadBranch.exe for unusual destination IP addresses

🔍 How to Verify

Check if Vulnerable:

Check the version of TeamViewer DEX Client installed. Versions below 25.11 are vulnerable.

Check Version:

Check TeamViewer DEX Client version in Control Panel > Programs and Features or via the application interface

Verify Fix Applied:

Verify that TeamViewer DEX Client version is 25.11 or higher and that NomadBranch.exe service is running the updated version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections from NomadBranch.exe
  • Service restart events for TeamViewer DEX components

Network Indicators:

  • Unexpected outbound connections from NomadBranch.exe to internal IP addresses
  • Unusual data transfers from the Content Distribution Service

SIEM Query:

source="NomadBranch.exe" AND (dest_ip NOT IN [expected_ip_range])

🔗 References

📤 Share & Export