A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field. Users of 1E Client version 24.5 or higher are not affected.
References
| Link | Resource |
|---|---|
| https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1002/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
11 Feb 2026, 20:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1002/ - Vendor Advisory | |
| First Time |
Teamviewer digital Employee Experience
Teamviewer Microsoft Microsoft windows |
|
| CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* |
29 Jan 2026, 09:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-29 09:16
Updated : 2026-02-11 20:22
NVD link : CVE-2026-23571
Mitre link : CVE-2026-23571
CVE.ORG link : CVE-2026-23571
JSON object : View
Products Affected
teamviewer
- digital_employee_experience
microsoft
- windows
CWE
CWE-20
Improper Input Validation
