CVE-2025-64992

6.8 MEDIUM

📋 TL;DR

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary commands on connected devices. This enables remote code execution with elevated privileges on systems managed through the platform. Organizations using vulnerable versions of TeamViewer DEX are affected.

💻 Affected Systems

Products:
  • TeamViewer DEX (formerly 1E DEX)
Versions: All versions prior to V25
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Actioner privileges; affects the 1E-Nomad-PauseNomadJobQueue instruction specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all connected devices, allowing attackers to install persistent malware, steal sensitive data, or disrupt operations across the entire managed environment.

🟠

Likely Case

Targeted attackers with Actioner credentials could execute commands on specific devices to establish footholds, move laterally, or exfiltrate data from vulnerable systems.

🟢

If Mitigated

With proper access controls and network segmentation, impact would be limited to isolated segments, though compromised Actioner accounts could still affect authorized devices.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access with Actioner privileges; command injection is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V25 or later

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/

Restart Required: Yes

Instructions:

1. Download TeamViewer DEX V25 or later from official sources. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart affected services/systems. 5. Verify successful update.

🔧 Temporary Workarounds

Restrict Actioner Privileges

all

Temporarily reduce the number of users with Actioner privileges to only essential personnel.

Network Segmentation

all

Isolate TeamViewer DEX management traffic to separate VLANs and restrict access to management interfaces.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all Actioner account activity for suspicious behavior.
  • Deploy application allowlisting on managed devices to prevent execution of unauthorized commands.

🔍 How to Verify

Check if Vulnerable:

Check TeamViewer DEX version; if below V25, the system is vulnerable. Also verify if 1E-Nomad-PauseNomadJobQueue instruction is present.

Check Version:

On Windows: Check TeamViewer DEX About dialog or registry. On Linux: Check package version via dpkg -l | grep teamviewer-dex or rpm -qa | grep teamviewer-dex

Verify Fix Applied:

Confirm version is V25 or later and test that command injection attempts in the affected instruction are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns via 1E-Nomad-PauseNomadJobQueue
  • Multiple failed authentication attempts followed by successful Actioner login
  • Suspicious commands executed from Actioner accounts

Network Indicators:

  • Unexpected outbound connections from TeamViewer DEX servers
  • Anomalous traffic patterns to/from management interfaces

SIEM Query:

source="teamviewer-dex" AND (event_type="command_execution" AND command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export