Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23564: CWE-319 Cleartext Transmission of Sensitive Information in TeamViewer DEX

0
Medium
VulnerabilityCVE-2026-23564cvecve-2026-23564cwe-319
Published: Thu Jan 29 2026 (01/29/2026, 08:43:43 UTC)
Source: CVE Database V5
Vendor/Project: TeamViewer
Product: DEX

Description

A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause normally encrypted UDP traffic to be sent in cleartext. This can result in disclosure of sensitive information.

AI-Powered Analysis

AILast updated: 01/29/2026, 09:29:44 UTC

Technical Analysis

CVE-2026-23564 identifies a vulnerability in the TeamViewer DEX Client, specifically within its Content Distribution Service component (NomadBranch.exe) for Windows versions prior to 26.1. The flaw pertains to the transmission of UDP traffic that is normally encrypted; however, due to this vulnerability, an attacker positioned on the adjacent network can intercept this traffic in cleartext. This cleartext transmission violates secure communication protocols and leads to the disclosure of sensitive information that would otherwise be protected. The vulnerability is classified under CWE-319, which concerns the cleartext transmission of sensitive data. The attack vector is adjacent network (AV:A), meaning the attacker must have access to the same local network segment or a logically adjacent network. No privileges are required (PR:N), no user interaction is needed (UI:N), and the scope is unchanged (S:U). The impact is high on confidentiality (C:H), but there is no impact on integrity (I:N) or availability (A:N). Although no exploits have been reported in the wild, the vulnerability poses a significant risk for data leakage in environments where TeamViewer DEX is used for content distribution. The absence of a patch link suggests that remediation may require updating to version 26.1 or later once released. The vulnerability highlights a critical lapse in encryption handling for UDP traffic within the affected software component, potentially exposing sensitive operational or user data to attackers on the same network segment.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information transmitted via TeamViewer DEX's content distribution service. Organizations that rely on TeamViewer DEX for internal content distribution over local networks are particularly vulnerable, as attackers on the same network can intercept unencrypted UDP traffic. This exposure could compromise confidential business data, intellectual property, or personal data, potentially violating GDPR requirements. The lack of impact on integrity and availability limits the threat to data confidentiality, but the sensitivity of the leaked information could still result in reputational damage, regulatory penalties, and operational risks. Industries with high data sensitivity such as finance, healthcare, and government entities in Europe are at elevated risk. Since exploitation requires network adjacency, organizations with segmented and well-controlled internal networks may reduce exposure, but those with flat or poorly segmented networks face higher risks. The absence of known exploits in the wild reduces immediate urgency but does not eliminate the risk of future exploitation.

Mitigation Recommendations

European organizations should prioritize upgrading TeamViewer DEX Client to version 26.1 or later as soon as it becomes available to ensure the vulnerability is patched. Until an update is applied, network administrators should enforce strict network segmentation and access controls to limit the ability of unauthorized devices to connect to the same local network segments as TeamViewer DEX clients. Deploying network monitoring tools to detect unusual UDP traffic patterns may help identify potential exploitation attempts. Additionally, organizations should consider encrypting sensitive data at the application layer before transmission to mitigate risks from cleartext exposure. Regularly auditing and updating endpoint security policies to restrict installation and use of vulnerable software versions is recommended. Finally, educating IT staff about the risks of adjacent network attacks and enforcing strong network access controls can further reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TV
Date Reserved
2026-01-14T13:54:40.322Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697b248fac0632022277b77c

Added to database: 1/29/2026, 9:12:47 AM

Last enriched: 1/29/2026, 9:29:44 AM

Last updated: 2/4/2026, 4:12:35 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats