CVE-2026-23568

5.4 MEDIUM

📋 TL;DR

An out-of-bounds read vulnerability in TeamViewer DEX Client's Content Distribution Service (NomadBranch.exe) allows adjacent network attackers to read memory contents, potentially disclosing sensitive information or causing denial-of-service. This affects Windows systems running TeamViewer DEX Client versions before 26.1. The vulnerability could help bypass ASLR protections to enable further exploitation.

💻 Affected Systems

Products:
  • TeamViewer DEX Client (formerly 1E Client)
Versions: All versions prior to 26.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Content Distribution Service (NomadBranch.exe) to be running and accessible on adjacent network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Memory disclosure leads to ASLR bypass enabling remote code execution, full system compromise, and lateral movement through the network.

🟠

Likely Case

Information disclosure revealing memory contents, potential denial-of-service crashes, and reconnaissance data for further attacks.

🟢

If Mitigated

Limited to adjacent network access, reducing exposure compared to internet-facing systems.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires adjacent network access and crafting of special packets.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 26.1

Vendor Advisory: https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/

Restart Required: Yes

Instructions:

1. Download TeamViewer DEX Client version 26.1 or later from official TeamViewer sources. 2. Install the update following vendor instructions. 3. Restart the system to ensure the patch is fully applied.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict network access to NomadBranch.exe service to trusted hosts only using firewall rules.

netsh advfirewall firewall add rule name="Block NomadBranch" dir=in action=block protocol=TCP localport=5938 program="%ProgramFiles%\TeamViewer\NomadBranch.exe"
netsh advfirewall firewall add rule name="Block NomadBranch UDP" dir=in action=block protocol=UDP localport=5938 program="%ProgramFiles%\TeamViewer\NomadBranch.exe"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems running vulnerable TeamViewer DEX Client from untrusted networks.
  • Monitor network traffic to/from NomadBranch.exe for anomalous patterns and implement intrusion detection rules.

🔍 How to Verify

Check if Vulnerable:

Check TeamViewer DEX Client version in installed programs or via 'NomadBranch.exe' file properties.

Check Version:

wmic product where "name like 'TeamViewer DEX%'" get version

Verify Fix Applied:

Verify installed version is 26.1 or higher in program details or file properties.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of NomadBranch.exe in Windows Event Logs
  • Unusual network connections to NomadBranch.exe service

Network Indicators:

  • Anomalous packets to port 5938 (default NomadBranch port)
  • Unexpected out-of-bounds memory read attempts in network traffic

SIEM Query:

source="windows" AND (event_id=1000 OR event_id=1001) AND process_name="NomadBranch.exe"

🔗 References

📤 Share & Export