CVE-2026-23564: CWE-319 Cleartext Transmission of Sensitive Information in TeamViewer DEX
A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause normally encrypted UDP traffic to be sent in cleartext. This can result in disclosure of sensitive information.
AI Analysis
Technical Summary
CVE-2026-23564 identifies a vulnerability in the TeamViewer DEX Client, specifically within its Content Distribution Service component (NomadBranch.exe) for Windows versions prior to 26.1. The flaw pertains to the transmission of UDP traffic that is normally encrypted; however, due to this vulnerability, an attacker positioned on the adjacent network can intercept this traffic in cleartext. This cleartext transmission violates secure communication protocols and leads to the disclosure of sensitive information that would otherwise be protected. The vulnerability is classified under CWE-319, which concerns the cleartext transmission of sensitive data. The attack vector is adjacent network (AV:A), meaning the attacker must have access to the same local network segment or a logically adjacent network. No privileges are required (PR:N), no user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact is high on confidentiality (C:H), but there is no impact on integrity (I:N) or availability (A:N). Although no exploits have been reported in the wild, the vulnerability poses a significant risk for data leakage in environments where TeamViewer DEX is used for content distribution. The absence of a patch link suggests that remediation may require updating to version 26.1 or later once released. The vulnerability highlights a critical lapse in encryption handling for UDP traffic within the affected software component, potentially exposing sensitive operational or user data to attackers on the same network segment.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information transmitted via TeamViewer DEX's content distribution service. Organizations that rely on TeamViewer DEX for internal content distribution over local networks are particularly vulnerable, as attackers on the same network can intercept unencrypted UDP traffic. This exposure could compromise confidential business data, intellectual property, or personal data, potentially violating GDPR requirements. The lack of impact on integrity and availability limits the threat to data confidentiality, but the sensitivity of the leaked information could still result in reputational damage, regulatory penalties, and operational risks. Industries with high data sensitivity such as finance, healthcare, and government entities in Europe are at elevated risk. Since exploitation requires network adjacency, organizations with segmented and well-controlled internal networks may reduce exposure, but those with flat or poorly segmented networks face higher risks. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the risk of future exploitation.
Mitigation Recommendations
European organizations should prioritize upgrading TeamViewer DEX Client to version 26.1 or later as soon as it becomes available to ensure the vulnerability is patched. Until an update is applied, network administrators should enforce strict network segmentation and access controls to limit the ability of unauthorized devices to connect to the same local network segments as TeamViewer DEX clients. Deploying network monitoring tools to detect unusual UDP traffic patterns may help identify potential exploitation attempts. Additionally, organizations should consider encrypting sensitive data at the application layer before transmission to mitigate risks from cleartext exposure. Regularly auditing and updating endpoint security policies to restrict installation and use of vulnerable software versions is recommended. Finally, educating IT staff about the risks of adjacent network attacks and enforcing strong network access controls can further reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2026-23564: CWE-319 Cleartext Transmission of Sensitive Information in TeamViewer DEX
Description
A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause normally encrypted UDP traffic to be sent in cleartext. This can result in disclosure of sensitive information.
AI-Powered Analysis
Technical Analysis
CVE-2026-23564 identifies a vulnerability in the TeamViewer DEX Client, specifically within its Content Distribution Service component (NomadBranch.exe) for Windows versions prior to 26.1. The flaw pertains to the transmission of UDP traffic that is normally encrypted; however, due to this vulnerability, an attacker positioned on the adjacent network can intercept this traffic in cleartext. This cleartext transmission violates secure communication protocols and leads to the disclosure of sensitive information that would otherwise be protected. The vulnerability is classified under CWE-319, which concerns the cleartext transmission of sensitive data. The attack vector is adjacent network (AV:A), meaning the attacker must have access to the same local network segment or a logically adjacent network. No privileges are required (PR:N), no user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact is high on confidentiality (C:H), but there is no impact on integrity (I:N) or availability (A:N). Although no exploits have been reported in the wild, the vulnerability poses a significant risk for data leakage in environments where TeamViewer DEX is used for content distribution. The absence of a patch link suggests that remediation may require updating to version 26.1 or later once released. The vulnerability highlights a critical lapse in encryption handling for UDP traffic within the affected software component, potentially exposing sensitive operational or user data to attackers on the same network segment.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information transmitted via TeamViewer DEX's content distribution service. Organizations that rely on TeamViewer DEX for internal content distribution over local networks are particularly vulnerable, as attackers on the same network can intercept unencrypted UDP traffic. This exposure could compromise confidential business data, intellectual property, or personal data, potentially violating GDPR requirements. The lack of impact on integrity and availability limits the threat to data confidentiality, but the sensitivity of the leaked information could still result in reputational damage, regulatory penalties, and operational risks. Industries with high data sensitivity such as finance, healthcare, and government entities in Europe are at elevated risk. Since exploitation requires network adjacency, organizations with segmented and well-controlled internal networks may reduce exposure, but those with flat or poorly segmented networks face higher risks. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the risk of future exploitation.
Mitigation Recommendations
European organizations should prioritize upgrading TeamViewer DEX Client to version 26.1 or later as soon as it becomes available to ensure the vulnerability is patched. Until an update is applied, network administrators should enforce strict network segmentation and access controls to limit the ability of unauthorized devices to connect to the same local network segments as TeamViewer DEX clients. Deploying network monitoring tools to detect unusual UDP traffic patterns may help identify potential exploitation attempts. Additionally, organizations should consider encrypting sensitive data at the application layer before transmission to mitigate risks from cleartext exposure. Regularly auditing and updating endpoint security policies to restrict installation and use of vulnerable software versions is recommended. Finally, educating IT staff about the risks of adjacent network attacks and enforcing strong network access controls can further reduce exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- TV
- Date Reserved
- 2026-01-14T13:54:40.322Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 697b248fac0632022277b77c
Added to database: 1/29/2026, 9:12:47 AM
Last enriched: 1/29/2026, 9:29:44 AM
Last updated: 2/4/2026, 4:12:35 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22549: CWE-250: Execution with Unnecessary Privileges in F5 F5 BIG-IP Container Ingress Services
MediumCVE-2025-70545: n/a
HighCVE-2026-0873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ercom Cryptobox
MediumCVE-2026-22548: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in F5 BIG-IP
MediumCVE-2026-20732: CWE-451: User Interface (UI) Misrepresentation of Critical Information in F5 BIG-IP
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.