CVE-2025-64989

7.2 HIGH

📋 TL;DR

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary commands on connected devices. This enables remote code execution with elevated privileges on systems managed through the platform. Organizations using vulnerable versions of TeamViewer DEX are affected.

💻 Affected Systems

Products:
  • TeamViewer DEX (formerly 1E DEX)
Versions: All versions prior to V21.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with Actioner privileges; affects the 1E-Explorer-TachyonCore-FindFileBySizeAndHash instruction specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all connected devices, allowing attackers to install malware, steal data, pivot to other systems, and maintain persistent access across the enterprise network.

🟠

Likely Case

Targeted attackers with Actioner credentials could execute commands on specific devices to deploy ransomware, exfiltrate sensitive data, or establish footholds for lateral movement.

🟢

If Mitigated

With proper network segmentation and least privilege access, impact would be limited to isolated segments and specific devices rather than enterprise-wide compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid Actioner credentials but command injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V21.1 and later

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/

Restart Required: Yes

Instructions:

1. Download TeamViewer DEX V21.1 or later from official sources. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart affected services/systems. 5. Verify successful update.

🔧 Temporary Workarounds

Restrict Actioner Privileges

all

Temporarily reduce the number of users with Actioner privileges to only essential personnel.

Network Segmentation

all

Isolate TeamViewer DEX management network from critical systems to limit lateral movement potential.

🧯 If You Can't Patch

  • Implement strict input validation and command sanitization at the application layer
  • Deploy application control/whitelisting to prevent execution of unauthorized commands

🔍 How to Verify

Check if Vulnerable:

Check TeamViewer DEX version in administration console or via 'dex --version' command on managed devices.

Check Version:

dex --version

Verify Fix Applied:

Confirm version is V21.1 or later and test the FindFileBySizeAndHash instruction with malicious input to verify sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in DEX logs
  • Multiple failed authentication attempts followed by successful Actioner login
  • Execution of unexpected system commands via DEX instructions

Network Indicators:

  • Unusual outbound connections from DEX-managed devices
  • Traffic to known malicious IPs originating from DEX infrastructure

SIEM Query:

source="teamviewer_dex" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export