Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-46266: CWE-20 Improper Input Validation in TeamViewer DEX

0
Medium
VulnerabilityCVE-2025-46266cvecve-2025-46266cwe-20
Published: Thu Dec 11 2025 (12/11/2025, 11:25:11 UTC)
Source: CVE Database V5
Vendor/Project: TeamViewer
Product: DEX

Description

A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to coerce the service into transmitting data to an arbitrary internal IP address, potentially leaking sensitive information.

AI-Powered Analysis

AILast updated: 12/11/2025, 11:56:30 UTC

Technical Analysis

CVE-2025-46266 is an input validation vulnerability classified under CWE-20 found in the TeamViewer DEX Client, specifically in the Content Distribution Service component named NomadBranch.exe, affecting versions prior to 25.11 on Windows platforms. The flaw allows a remote attacker to manipulate the service into transmitting data to arbitrary internal IP addresses within the victim's network. This occurs because the service does not properly validate or sanitize input parameters controlling the destination of data transmissions. As a result, an attacker with network access adjacent to the victim can coerce the service to leak sensitive internal information by redirecting data flows to internal hosts controlled or monitored by the attacker. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting low complexity of attack (AC:L), no privileges required (PR:N), no user interaction (UI:N), and limited impact confined to confidentiality (C:L) without affecting integrity or availability. No public exploits are known at this time, and no patches have been linked yet, though a fixed version 25.11 is indicated. The vulnerability poses a risk primarily to organizations using TeamViewer DEX for endpoint management and content distribution, especially those with sensitive internal network segments that could be targeted for data exfiltration.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive internal information if exploited. Since the flaw allows data to be sent to arbitrary internal IP addresses, attackers could leverage it to bypass perimeter defenses and extract confidential data from segmented network zones. This is particularly concerning for enterprises handling sensitive personal data under GDPR, critical infrastructure operators, and organizations with strict data confidentiality requirements. Although the vulnerability does not impact system integrity or availability, the confidentiality breach could result in regulatory penalties, reputational damage, and potential secondary attacks leveraging leaked information. The medium CVSS score reflects moderate risk, but the lack of required privileges and user interaction increases the likelihood of exploitation in environments where network access controls are weak or misconfigured.

Mitigation Recommendations

Organizations should prioritize upgrading TeamViewer DEX Client to version 25.11 or later once the patch is officially released. Until then, network segmentation should be enforced to restrict access to the Content Distribution Service (NomadBranch.exe) from untrusted or less secure network segments. Implement strict firewall rules to limit which internal IP addresses the service can communicate with, preventing arbitrary redirection. Monitoring network traffic for unusual data flows originating from the TeamViewer DEX service can help detect exploitation attempts. Additionally, review and harden internal network access controls and consider disabling or restricting the Content Distribution Service if not essential. Regularly audit TeamViewer DEX deployments and maintain up-to-date inventories to ensure vulnerable versions are identified and remediated promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TV
Date Reserved
2025-04-30T08:08:15.972Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693aad517d4c6f31f7a4fe37

Added to database: 12/11/2025, 11:38:57 AM

Last enriched: 12/11/2025, 11:56:30 AM

Last updated: 12/12/2025, 3:59:39 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats