A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-ConfigMgrConsoleExtensions instructions. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
References
| Link | Resource |
|---|---|
| https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ | Vendor Advisory |
Configurations
History
09 Jan 2026, 02:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Teamviewer
Teamviewer digital Employee Experience |
|
| CWE | CWE-77 | |
| References | () https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ - Vendor Advisory | |
| CPE | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* |
11 Dec 2025, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 12:16
Updated : 2026-01-09 02:06
NVD link : CVE-2025-64993
Mitre link : CVE-2025-64993
CVE.ORG link : CVE-2025-64993
JSON object : View
Products Affected
teamviewer
- digital_employee_experience
