CVE-2025-64987

7.2 HIGH

📋 TL;DR

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary commands on connected devices. This enables remote code execution with elevated privileges on systems managed through the platform. Organizations using vulnerable versions of TeamViewer DEX are affected.

💻 Affected Systems

Products:
  • TeamViewer DEX (formerly 1E DEX)
Versions: Versions prior to the fix mentioned in TV-2025-1006
Operating Systems: All platforms where TeamViewer DEX is installed
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Actioner privileges for exploitation. All deployments with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all connected devices, allowing attackers to install malware, steal data, pivot to other systems, and maintain persistent access across the enterprise network.

🟠

Likely Case

Targeted attackers with Actioner credentials could execute commands on specific devices to steal sensitive information, deploy ransomware, or establish footholds for lateral movement.

🟢

If Mitigated

With proper access controls, network segmentation, and monitoring, impact is limited to isolated systems with rapid detection and containment.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with Actioner privileges. The vulnerability is in the 1E-Explorer-TachyonCore-CheckSimpleIoC instruction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version specified in TV-2025-1006 advisory

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/

Restart Required: Yes

Instructions:

1. Review TeamViewer advisory TV-2025-1006. 2. Update TeamViewer DEX to the patched version. 3. Restart affected services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Actioner Privileges

all

Temporarily reduce the number of users with Actioner privileges to only essential personnel.

Network Segmentation

all

Isolate TeamViewer DEX management network from critical systems to limit lateral movement.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all Actioner account activity
  • Deploy network segmentation to isolate TeamViewer DEX from critical assets

🔍 How to Verify

Check if Vulnerable:

Check TeamViewer DEX version against the patched version in advisory TV-2025-1006

Check Version:

Check TeamViewer DEX console or documentation for version information

Verify Fix Applied:

Confirm installation of the patched version and test that command injection attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns from Actioner accounts
  • Failed command injection attempts in application logs

Network Indicators:

  • Unexpected outbound connections from managed devices following DEX commands

SIEM Query:

Search for '1E-Explorer-TachyonCore-CheckSimpleIoC' with suspicious parameters in TeamViewer DEX logs

🔗 References

📤 Share & Export