Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23568: CWE-125 Out-of-bounds Read in TeamViewer DEX

0
Medium
VulnerabilityCVE-2026-23568cvecve-2026-23568cwe-125
Published: Thu Jan 29 2026 (01/29/2026, 08:48:17 UTC)
Source: CVE Database V5
Vendor/Project: TeamViewer
Product: DEX

Description

CVE-2026-23568 is an out-of-bounds read vulnerability in the TeamViewer DEX Client's Content Distribution Service (NomadBranch. exe) prior to version 26. 1 on Windows. An attacker on the adjacent network can send specially crafted packets to cause information disclosure or denial-of-service. The leaked memory may help bypass ASLR, facilitating further exploitation. The vulnerability has a CVSS score of 5. 4 (medium severity) and does not require authentication or user interaction. No known exploits are currently reported in the wild. This flaw affects organizations using TeamViewer DEX for content distribution, potentially exposing sensitive memory data and causing service disruption.

AI-Powered Analysis

AILast updated: 01/29/2026, 09:28:31 UTC

Technical Analysis

CVE-2026-23568 is classified as a CWE-125 out-of-bounds read vulnerability affecting the TeamViewer DEX Client, specifically the Content Distribution Service component (NomadBranch.exe) on Windows platforms prior to version 26.1. The vulnerability arises when the service processes specially crafted network packets from an attacker located on the adjacent network segment. By exploiting this flaw, the attacker can read memory beyond the intended buffer boundaries, leading to information disclosure. The leaked memory content can include sensitive data that may assist in bypassing Address Space Layout Randomization (ASLR), a critical security mitigation, thereby increasing the risk of subsequent exploitation such as code execution. Additionally, the vulnerability can cause denial-of-service conditions by destabilizing the service. The attack vector is network-based with low attack complexity, requiring no privileges or user interaction, making it relatively accessible to attackers within the local network environment. Although no exploits have been reported in the wild, the vulnerability's presence in a widely used remote support and content distribution tool elevates its risk profile. The CVSS 3.1 base score of 5.4 reflects a medium severity, primarily due to the limited scope of impact (confidentiality and availability) and the adjacent network attack vector.

Potential Impact

For European organizations, the vulnerability poses a moderate risk, especially for enterprises and service providers relying on TeamViewer DEX for remote content distribution and support. Information disclosure could lead to leakage of sensitive memory data, potentially exposing credentials, session tokens, or other critical information. The ability to bypass ASLR increases the threat of more severe attacks, including remote code execution, if combined with other vulnerabilities. Denial-of-service impacts could disrupt business operations, particularly in environments where continuous remote access and content delivery are essential. Given the medium CVSS score and no reported active exploitation, the immediate risk is moderate; however, the potential for escalation to more critical attacks necessitates timely remediation. European organizations with strict data protection regulations (e.g., GDPR) must consider the implications of any data leakage. Additionally, sectors with high reliance on remote support tools, such as finance, healthcare, and critical infrastructure, may face increased operational risks.

Mitigation Recommendations

Organizations should prioritize updating TeamViewer DEX Client to version 26.1 or later, where this vulnerability is addressed. In the absence of an available patch, network segmentation should be enforced to restrict access to the Content Distribution Service only to trusted hosts and networks, minimizing exposure to adjacent network attackers. Implement strict firewall rules to limit inbound traffic to the NomadBranch.exe service port. Employ network monitoring and anomaly detection to identify unusual packet patterns indicative of exploitation attempts. Additionally, consider disabling or restricting the use of the Content Distribution Service if it is not essential to operations. Regularly audit and review remote access tools and their configurations to ensure minimal attack surface. Finally, maintain up-to-date endpoint protection and intrusion prevention systems capable of detecting exploitation attempts targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TV
Date Reserved
2026-01-14T13:54:40.322Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697b248fac0632022277b788

Added to database: 1/29/2026, 9:12:47 AM

Last enriched: 1/29/2026, 9:28:31 AM

Last updated: 1/29/2026, 12:08:54 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats