CVE-2026-23566

6.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers on the same network to manipulate log files in TeamViewer DEX Client's Content Distribution Service by sending crafted UDP packets. This compromises log integrity and non-repudiation capabilities. Organizations using vulnerable versions of TeamViewer DEX Client on Windows are affected.

💻 Affected Systems

Products:
  • TeamViewer DEX Client (formerly 1E Client) - Content Distribution Service
Versions: All versions prior to 26.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the NomadBranch.exe component handling UDP network traffic for log management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could erase evidence of compromise, manipulate forensic data, or inject false log entries to mislead investigations and hide other malicious activities.

🟠

Likely Case

Log tampering that undermines audit trails and compliance requirements, potentially hiding unauthorized access or configuration changes.

🟢

If Mitigated

Limited to log manipulation without direct system compromise, but still impacts forensic capabilities and compliance.

🌐 Internet-Facing: LOW - The vulnerability requires adjacent network access, not direct internet exposure.
🏢 Internal Only: MEDIUM - Attackers on the same internal network segment can exploit this, making it relevant for insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network adjacency but no authentication, making it relatively straightforward for attackers on the same network segment.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 26.1 or later

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/

Restart Required: Yes

Instructions:

1. Download TeamViewer DEX Client version 26.1 or later from official TeamViewer sources. 2. Install the update following standard installation procedures. 3. Restart the system or service to ensure the patch is fully applied.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict UDP traffic to NomadBranch.exe by implementing network segmentation or firewall rules to limit access to trusted hosts only.

Example Windows Firewall rule: netsh advfirewall firewall add rule name="Block NomadBranch UDP" dir=in action=block protocol=UDP localport=xxxx program="C:\Path\To\NomadBranch.exe"
Replace xxxx with actual port used by NomadBranch.exe

Log File Protection

windows

Apply strict file permissions to the Nomad Branch.log file to prevent unauthorized modifications.

icacls "C:\Path\To\Nomad Branch.log" /inheritance:r /grant:r "SYSTEM:(F)" /grant:r "Administrators:(F)" /deny "Everyone:(W)"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running vulnerable TeamViewer DEX Client from untrusted network segments.
  • Monitor and alert on unexpected modifications to Nomad Branch.log files using file integrity monitoring solutions.

🔍 How to Verify

Check if Vulnerable:

Check the version of TeamViewer DEX Client installed. If version is below 26.1, the system is vulnerable.

Check Version:

Check TeamViewer DEX Client version through the application interface or by examining the installed program version in Windows Control Panel > Programs and Features.

Verify Fix Applied:

Confirm that TeamViewer DEX Client version is 26.1 or higher and verify that NomadBranch.exe is no longer accepting unauthorized UDP log injections.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modifications to Nomad Branch.log file timestamps or content
  • Log entries that don't match normal application behavior patterns

Network Indicators:

  • Unusual UDP traffic to the port used by NomadBranch.exe
  • UDP packets with crafted payloads targeting the log service

SIEM Query:

Example: source="Nomad Branch.log" AND (event_type="modification" OR event_type="injection") OR destination_port="[NomadBranch_port]" AND protocol="UDP" AND suspicious_payload=*

🔗 References

📤 Share & Export