A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to bypass file integrity validation via a crafted request. By providing a valid hash for a malicious file, an attacker can cause the service to incorrectly validate and process the file as trusted, enabling arbitrary code execution under the Nomad Branch service context.
References
| Link | Resource |
|---|---|
| https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1005/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
14 Jan 2026, 19:57
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* |
|
| CWE | NVD-CWE-noinfo | |
| First Time |
Teamviewer digital Employee Experience
Teamviewer Microsoft Microsoft windows |
|
| References | () https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1005/ - Vendor Advisory |
11 Dec 2025, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 12:16
Updated : 2026-01-14 19:57
NVD link : CVE-2025-44016
Mitre link : CVE-2025-44016
CVE.ORG link : CVE-2025-44016
JSON object : View
Products Affected
teamviewer
- digital_employee_experience
microsoft
- windows
CWE
