A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-SetWorkRate instruction prior V17.1. The improper handling of executable search paths could allow local attackers with write access to a PATH directory on a device to escalate privileges and execute arbitrary code as SYSTEM.
References
| Link | Resource |
|---|---|
| https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ | Vendor Advisory |
Configurations
History
09 Jan 2026, 02:04
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ - Vendor Advisory | |
| First Time |
Teamviewer
Teamviewer digital Employee Experience |
|
| CPE | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* |
11 Dec 2025, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 12:16
Updated : 2026-01-09 02:04
NVD link : CVE-2025-64994
Mitre link : CVE-2025-64994
CVE.ORG link : CVE-2025-64994
JSON object : View
Products Affected
teamviewer
- digital_employee_experience
CWE
CWE-427
Uncontrolled Search Path Element
