CVE-2025-64993

6.8 MEDIUM

📋 TL;DR

A command injection vulnerability in TeamViewer DEX (formerly 1E DEX) allows authenticated attackers with Actioner privileges to execute arbitrary commands on connected devices. This enables remote code execution with elevated privileges on managed endpoints. Organizations using affected TeamViewer DEX versions are at risk.

💻 Affected Systems

Products:
  • TeamViewer DEX (formerly 1E DEX)
Versions: Specific versions not detailed in advisory; all versions before the fix are likely affected
Operating Systems: Windows, Linux, macOS (where DEX agents are deployed)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Actioner privileges; vulnerability is in the 1E-ConfigMgrConsoleExtensions instructions component

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all connected devices, lateral movement across the network, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Targeted attackers with Actioner credentials gain control over specific devices for data theft, surveillance, or establishing footholds for further attacks.

🟢

If Mitigated

Limited impact due to restricted Actioner privileges, network segmentation, and proper input validation preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with Actioner privileges; command injection typically has low complexity once credentials are obtained

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory; update to latest TeamViewer DEX version

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/

Restart Required: Yes

Instructions:

1. Review TeamViewer advisory TV-2025-1006. 2. Update TeamViewer DEX to the latest version. 3. Restart affected services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Actioner Privileges

all

Temporarily reduce or remove Actioner privileges from non-essential accounts

# Review and modify user roles in TeamViewer DEX console

Network Segmentation

all

Isolate TeamViewer DEX management network from critical systems

# Configure firewall rules to restrict DEX traffic

🧯 If You Can't Patch

  • Implement strict least-privilege access controls for Actioner roles
  • Deploy network monitoring and EDR solutions to detect command injection attempts

🔍 How to Verify

Check if Vulnerable:

Check TeamViewer DEX version against the patched version in advisory TV-2025-1006

Check Version:

# Check TeamViewer DEX version via management console or agent query

Verify Fix Applied:

Confirm installation of the latest TeamViewer DEX version and test that command injection attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns in DEX logs
  • Multiple failed authentication attempts followed by successful Actioner login
  • Suspicious process creation from DEX components

Network Indicators:

  • Anomalous outbound connections from DEX-managed devices
  • Unexpected network traffic between DEX components

SIEM Query:

source="teamviewer_dex" AND (event_type="command_execution" AND command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export