A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction prior V3.4. Improper protection of the execution path on the local device allows attackers, with local access to the device during execution, to hijack the process and execute arbitrary code with SYSTEM privileges.
References
| Link | Resource |
|---|---|
| https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ | Vendor Advisory |
Configurations
History
09 Jan 2026, 02:02
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Teamviewer
Teamviewer digital Employee Experience |
|
| CPE | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* | |
| References | () https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/ - Vendor Advisory |
11 Dec 2025, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-11 12:16
Updated : 2026-01-09 02:02
NVD link : CVE-2025-64995
Mitre link : CVE-2025-64995
CVE.ORG link : CVE-2025-64995
JSON object : View
Products Affected
teamviewer
- digital_employee_experience
CWE
CWE-427
Uncontrolled Search Path Element
