Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64994: CWE-427 Uncontrolled Search Path Element in TeamViewer DEX

0
Medium
VulnerabilityCVE-2025-64994cvecve-2025-64994cwe-427
Published: Thu Dec 11 2025 (12/11/2025, 11:29:37 UTC)
Source: CVE Database V5
Vendor/Project: TeamViewer
Product: DEX

Description

A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-SetWorkRate instruction prior V17.1. The improper handling of executable search paths could allow local attackers with write access to a PATH directory on a device to escalate privileges and execute arbitrary code as SYSTEM.

AI-Powered Analysis

AILast updated: 12/11/2025, 11:55:27 UTC

Technical Analysis

CVE-2025-64994 is a privilege escalation vulnerability identified in TeamViewer DEX (formerly 1E DEX), specifically affecting versions prior to 17.1. The vulnerability stems from an uncontrolled search path element (CWE-427) in the 1E-Nomad-SetWorkRate instruction. This flaw allows local attackers who already have write access to directories listed in the system's PATH environment variable to place malicious executables that can be invoked with SYSTEM-level privileges. When the vulnerable instruction executes, it may run these attacker-controlled executables, resulting in arbitrary code execution with the highest system privileges. The vulnerability requires local access with some level of privilege (PR:H) and user interaction (UI:R), indicating that exploitation is not fully remote or automatic but still feasible in environments where users have write permissions to PATH directories. The CVSS v3.1 score of 6.5 reflects a medium severity, balancing the high impact on confidentiality, integrity, and availability with the limited attack vector and required privileges. No public exploits have been reported yet, but the nature of the vulnerability makes it a significant risk in environments where TeamViewer DEX is deployed for endpoint management or remote control. The lack of an official patch at the time of publication necessitates immediate mitigation through access control and monitoring.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for local attackers or malicious insiders to escalate privileges to SYSTEM level, effectively gaining full control over affected devices. This can lead to unauthorized access to sensitive data, disruption of critical services, and the deployment of persistent malware or ransomware. Organizations relying on TeamViewer DEX for endpoint management, remote support, or IT automation are particularly vulnerable, as compromised systems could undermine the security of entire networks. The impact extends to confidentiality, integrity, and availability, as attackers could exfiltrate data, alter system configurations, or cause system outages. Given the medium severity and the requirement for local access, the threat is more pronounced in environments with lax endpoint security, insufficient user privilege restrictions, or shared workstations. European entities in sectors such as finance, healthcare, and critical infrastructure, where TeamViewer DEX is used, face heightened risks of operational disruption and data breaches.

Mitigation Recommendations

1. Immediately audit and restrict write permissions on all directories included in the system PATH environment variable to prevent unauthorized modification. 2. Implement strict endpoint security policies that limit local user privileges, ensuring that only trusted administrators have write access to critical system paths. 3. Monitor filesystem changes and employ integrity checking tools to detect unauthorized additions or modifications to executables in PATH directories. 4. Enforce application whitelisting to prevent execution of unapproved binaries, especially in directories accessible to multiple users. 5. Educate users about the risks of executing untrusted code and the importance of reporting suspicious activity. 6. Maintain up-to-date backups and incident response plans to mitigate potential damage from exploitation. 7. Once available, promptly apply official patches or updates from TeamViewer addressing this vulnerability. 8. Consider isolating or segmenting systems running TeamViewer DEX to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TV
Date Reserved
2025-11-12T08:16:25.593Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693aad537d4c6f31f7a50468

Added to database: 12/11/2025, 11:38:59 AM

Last enriched: 12/11/2025, 11:55:27 AM

Last updated: 12/11/2025, 11:05:27 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats