Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23571: CWE-20 Improper Input Validation in TeamViewer DEX

0
Medium
VulnerabilityCVE-2026-23571cvecve-2026-23571cwe-20
Published: Thu Jan 29 2026 (01/29/2026, 08:41:45 UTC)
Source: CVE Database V5
Vendor/Project: TeamViewer
Product: DEX

Description

CVE-2026-23571 is a command injection vulnerability in TeamViewer DEX affecting versions prior to 24. 5. It arises from improper input validation in the 1E-Nomad-RunPkgStatusRequest instruction, allowing authenticated users with actioner privileges to execute arbitrary commands with elevated rights on connected hosts. Exploitation requires user interaction and authentication with elevated privileges. The vulnerability has a CVSS score of 6. 8, indicating medium severity, with high impact on confidentiality, integrity, and availability. No known exploits are currently reported in the wild. Users running TeamViewer DEX 24. 5 or later are not affected. European organizations using affected versions should prioritize patching and restrict actioner privileges to mitigate risk.

AI-Powered Analysis

AILast updated: 01/29/2026, 09:27:18 UTC

Technical Analysis

CVE-2026-23571 is a command injection vulnerability classified under CWE-20 (Improper Input Validation) found in TeamViewer DEX, formerly known as 1E DEX. The flaw exists specifically in the 1E-Nomad-RunPkgStatusRequest instruction, where insufficient validation of input allows an authenticated attacker with actioner privileges to inject and execute arbitrary commands on connected hosts with elevated permissions. This vulnerability leverages the ability to manipulate the instruction’s input field to run malicious commands, potentially compromising the confidentiality, integrity, and availability of affected systems. The vulnerability affects all versions prior to TeamViewer DEX 24.5; users of version 24.5 or higher are not vulnerable. The CVSS v3.1 score is 6.8, reflecting a medium severity rating, with attack vector being network-based, low attack complexity, requiring high privileges and user interaction, and resulting in high impact across all security objectives. No public exploits or active exploitation campaigns have been reported to date. The vulnerability is significant in environments where TeamViewer DEX is used for remote management, especially in enterprise and critical infrastructure settings, as it could allow lateral movement or privilege escalation if exploited. The lack of a patch link suggests that users should upgrade to version 24.5 or later to remediate the issue.

Potential Impact

For European organizations, this vulnerability poses a considerable risk, particularly for enterprises and critical infrastructure sectors that rely on TeamViewer DEX for remote management and automation. Successful exploitation could lead to unauthorized command execution with elevated privileges, enabling attackers to compromise sensitive data, disrupt operations, or deploy further malware. The impact on confidentiality, integrity, and availability is high, potentially resulting in data breaches, system downtime, and loss of trust. Given the requirement for authenticated access with actioner privileges, insider threats or compromised credentials could facilitate exploitation. Organizations with extensive remote management deployments or those in sectors such as finance, healthcare, energy, and government are at heightened risk. The absence of known exploits in the wild reduces immediate threat but does not eliminate the risk of future attacks, especially as threat actors often target widely used remote access tools.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately verify their TeamViewer DEX version and upgrade to version 24.5 or later, which is confirmed not vulnerable. Until upgrades are completed, restrict actioner privileges strictly to trusted personnel and implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Monitor logs for unusual command execution patterns related to the 1E-Nomad-RunPkgStatusRequest instruction. Employ network segmentation to limit the exposure of hosts managed via TeamViewer DEX. Conduct regular audits of user privileges and access controls to ensure least privilege principles are enforced. Additionally, implement endpoint detection and response (EDR) solutions capable of detecting anomalous command injection or privilege escalation activities. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TV
Date Reserved
2026-01-14T13:54:40.322Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 697b248fac0632022277b791

Added to database: 1/29/2026, 9:12:47 AM

Last enriched: 1/29/2026, 9:27:18 AM

Last updated: 1/29/2026, 12:09:57 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats