CVE-2026-23565

6.5 MEDIUM

📋 TL;DR

A vulnerability in TeamViewer DEX Client's Content Distribution Service (NomadBranch.exe) allows attackers on adjacent networks to crash the service via crafted requests, causing denial-of-service. This affects Windows systems running TeamViewer DEX Client (formerly 1E Client) Content Distribution Service versions prior to 26.1. The service disruption prevents content distribution functionality until restarted.

💻 Affected Systems

Products:
  • TeamViewer DEX Client (formerly 1E Client) Content Distribution Service
Versions: All versions prior to 26.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the Content Distribution Service (NomadBranch.exe) is running. The service typically runs on endpoints configured for content distribution.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of content distribution services across the organization, halting software deployments, updates, and configuration management until services are manually restarted.

🟠

Likely Case

Intermittent service outages affecting specific endpoints or network segments, requiring IT intervention to restart NomadBranch.exe processes.

🟢

If Mitigated

Minimal impact with quick detection and automated recovery processes in place, though some brief service interruption may occur.

🌐 Internet-Facing: LOW - The vulnerability requires adjacent network access, not internet-facing exposure.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems on adjacent networks can disrupt content distribution services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Crafted requests can be sent without authentication from adjacent network positions. The vulnerability is a NULL pointer dereference (CWE-476) that causes process termination.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 26.1 or later

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/

Restart Required: Yes

Instructions:

1. Download TeamViewer DEX Client version 26.1 or later from official sources. 2. Install the update on all affected systems. 3. Restart the Content Distribution Service or reboot systems to ensure the updated NomadBranch.exe is running.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate systems running NomadBranch.exe from untrusted network segments to prevent adjacent network attacks.

Service Monitoring and Auto-restart

windows

Configure monitoring to detect NomadBranch.exe crashes and automatically restart the service.

sc failure "NomadBranch" reset= 86400 actions= restart/5000/restart/5000/restart/5000

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running the vulnerable service from potential attackers on adjacent networks.
  • Deploy monitoring and alerting for NomadBranch.exe process crashes with rapid response procedures to manually restart services.

🔍 How to Verify

Check if Vulnerable:

Check the version of TeamViewer DEX Client installed. If NomadBranch.exe version is below 26.1, the system is vulnerable.

Check Version:

wmic datafile where name="C:\\Program Files\\TeamViewer\\DEX Client\\NomadBranch.exe" get version

Verify Fix Applied:

Verify that NomadBranch.exe version is 26.1 or higher and monitor for successful service operation without crashes.

📡 Detection & Monitoring

Log Indicators:

  • Windows Application Event Log entries showing NomadBranch.exe crashes (Event ID 1000)
  • Service termination events in System logs

Network Indicators:

  • Unusual network traffic patterns to/from systems running NomadBranch.exe on port 8080 (default)
  • Multiple connection attempts followed by service unavailability

SIEM Query:

source="windows" AND (event_id=1000 AND process_name="NomadBranch.exe") OR (event_id=7036 AND service_name="NomadBranch")

🔗 References

📤 Share & Export