CVE-2025-64990

6.8 MEDIUM

📋 TL;DR

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary commands on connected devices. This enables remote code execution with elevated privileges on systems managed through the platform. Organizations using vulnerable versions of TeamViewer DEX are affected.

💻 Affected Systems

Products:
  • TeamViewer DEX (formerly 1E DEX)
Versions: All versions prior to V21.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with Actioner privileges; affects the 1E-Explorer-TachyonCore-LogoffUser instruction specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all connected devices, allowing attackers to deploy ransomware, steal sensitive data, or establish persistent backdoors across the entire managed environment.

🟠

Likely Case

Targeted compromise of specific devices for data exfiltration, lateral movement within the network, or deployment of malware on selected systems.

🟢

If Mitigated

Limited impact due to network segmentation, least privilege access controls, and comprehensive monitoring detecting anomalous command execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection vulnerabilities are typically straightforward to weaponize once discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V21.1 and later

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/

Restart Required: Yes

Instructions:

1. Download TeamViewer DEX version 21.1 or later from official sources. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart affected services/systems. 5. Verify successful update.

🔧 Temporary Workarounds

Restrict Actioner Privileges

all

Temporarily reduce the number of users with Actioner privileges to only essential personnel.

Network Segmentation

all

Isolate TeamViewer DEX management traffic from production systems using firewalls or network segmentation.

🧯 If You Can't Patch

  • Implement strict input validation and command sanitization at the application layer
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious command execution

🔍 How to Verify

Check if Vulnerable:

Check TeamViewer DEX version in administration console; versions below 21.1 are vulnerable.

Check Version:

Check via TeamViewer DEX administration interface or consult vendor documentation for CLI version check.

Verify Fix Applied:

Confirm version is 21.1 or higher in administration console and verify the 1E-Explorer-TachyonCore-LogoffUser instruction has proper input validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns via 1E-Explorer-TachyonCore-LogoffUser
  • Multiple failed authentication attempts followed by successful Actioner login
  • Suspicious command strings in DEX execution logs

Network Indicators:

  • Anomalous outbound connections from DEX-managed devices
  • Unexpected network traffic patterns from DEX servers

SIEM Query:

source="teamviewer_dex" AND (event="command_execution" AND command="*;*" OR command="*|*" OR command="*&*" OR command="*`*")

🔗 References

📤 Share & Export