CVE-2025-64988

7.2 HIGH

📋 TL;DR

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary commands on connected devices. This enables remote code execution with elevated privileges on systems running vulnerable versions. Organizations using TeamViewer DEX prior to version 19.2 are affected.

💻 Affected Systems

Products:
  • TeamViewer DEX (formerly 1E DEX)
Versions: All versions prior to V19.2
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Actioner privileges for exploitation. Affects the 1E-Nomad-GetCmContentLocations instruction functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of connected devices leading to data theft, ransomware deployment, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Attackers with Actioner credentials execute commands to steal sensitive data, deploy malware, or disrupt operations on vulnerable endpoints.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with Actioner privileges. The vulnerability is in input validation for command execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V19.2 or later

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/

Restart Required: Yes

Instructions:

1. Download TeamViewer DEX version 19.2 or later from official sources. 2. Deploy the update to all affected systems. 3. Restart the TeamViewer DEX service on all updated systems.

🔧 Temporary Workarounds

Restrict Actioner Privileges

all

Temporarily reduce the number of users with Actioner privileges to minimize attack surface.

Network Segmentation

all

Isolate TeamViewer DEX management traffic to prevent lateral movement if exploited.

🧯 If You Can't Patch

  • Implement strict access controls and review all users with Actioner privileges immediately.
  • Deploy network monitoring and intrusion detection systems to detect command injection attempts.

🔍 How to Verify

Check if Vulnerable:

Check TeamViewer DEX version. If version is below 19.2, the system is vulnerable.

Check Version:

On Windows: Check TeamViewer DEX About section in GUI or registry. On Linux: Check package version or installation directory.

Verify Fix Applied:

Confirm version is 19.2 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in TeamViewer DEX logs
  • Multiple failed authentication attempts followed by successful Actioner login

Network Indicators:

  • Unexpected outbound connections from TeamViewer DEX systems
  • Anomalous network traffic to/from TeamViewer DEX management ports

SIEM Query:

source="TeamViewer DEX" AND (event="command_execution" OR event="authentication") | stats count by user, command

🔗 References

📤 Share & Export