CVE-2026-23572: CWE-863 Incorrect Authorization in TeamViewer Remote
CVE-2026-23572 is a high-severity improper access control vulnerability in TeamViewer Full and Host clients on Windows, macOS, and Linux prior to version 15. 74. 5. It allows an authenticated remote user to bypass the 'Allow after confirmation' setting, gaining unauthorized access before local confirmation is given. Exploitation requires prior authentication via ID/password, Session Link, or Easy Access. The vulnerability impacts confidentiality, integrity, and availability of remote systems. No known exploits are currently in the wild. European organizations using vulnerable TeamViewer versions are at risk, especially those relying on remote access for critical operations. Mitigation involves promptly updating TeamViewer to version 15. 74.
AI Analysis
Technical Summary
CVE-2026-23572 is an improper access control vulnerability classified under CWE-863, affecting TeamViewer Full and Host clients on Windows, macOS, and Linux platforms prior to version 15.74.5. The flaw arises from a bypass of the 'Allow after confirmation' feature, which is designed to require local user confirmation before granting remote session access. An authenticated attacker—who has already gained remote session authentication through valid credentials, Session Link, or Easy Access—can exploit this vulnerability to circumvent the local confirmation step, thereby gaining unauthorized access to the remote system. This bypass undermines the intended security control that prevents unauthorized remote control without explicit local user approval. The vulnerability has a CVSS v3.1 base score of 7.2, indicating high severity, with attack vector being network-based, low attack complexity, requiring high privileges (authenticated user), no user interaction, and impacting confidentiality, integrity, and availability. Although no public exploits are known at this time, the vulnerability poses a significant risk because it allows an authenticated user to escalate privileges and control a system without local user consent, potentially leading to data theft, system manipulation, or denial of service. The affected versions include all TeamViewer Full and Host clients prior to 15.74.5 across major desktop operating systems. The vulnerability was reserved in January 2026 and published in February 2026, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the impact of CVE-2026-23572 can be substantial, especially for those relying heavily on TeamViewer for remote support, teleworking, or critical infrastructure management. Unauthorized access prior to local confirmation can lead to exposure of sensitive data, unauthorized system changes, and potential disruption of services. Confidentiality is at risk as attackers can access private information; integrity is compromised through unauthorized modifications; and availability may be affected if attackers disrupt or disable systems. Sectors such as finance, healthcare, manufacturing, and government agencies that use TeamViewer for remote operations are particularly vulnerable. The requirement for prior authentication limits exploitation to insiders or attackers who have obtained valid credentials, but social engineering or credential theft could facilitate this. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly. The vulnerability could also be leveraged in targeted attacks against European organizations with high-value assets or critical operations.
Mitigation Recommendations
The primary mitigation is to upgrade all TeamViewer Full and Host clients to version 15.74.5 or later, where the vulnerability is patched. Organizations should enforce strict access controls and multi-factor authentication (MFA) for TeamViewer accounts to reduce the risk of credential compromise. Review and tighten remote access policies, limiting the use of 'Allow after confirmation' configurations where possible, or replacing them with more secure alternatives. Monitor remote session logs for unusual activity and implement network segmentation to restrict TeamViewer access to trusted networks and devices. Educate users about phishing and credential theft risks to prevent unauthorized authentication. Consider deploying endpoint detection and response (EDR) solutions to detect anomalous remote access behaviors. Regularly audit TeamViewer configurations and access permissions to ensure compliance with security policies. Finally, maintain an incident response plan that includes procedures for remote access compromise scenarios.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Switzerland
CVE-2026-23572: CWE-863 Incorrect Authorization in TeamViewer Remote
Description
CVE-2026-23572 is a high-severity improper access control vulnerability in TeamViewer Full and Host clients on Windows, macOS, and Linux prior to version 15. 74. 5. It allows an authenticated remote user to bypass the 'Allow after confirmation' setting, gaining unauthorized access before local confirmation is given. Exploitation requires prior authentication via ID/password, Session Link, or Easy Access. The vulnerability impacts confidentiality, integrity, and availability of remote systems. No known exploits are currently in the wild. European organizations using vulnerable TeamViewer versions are at risk, especially those relying on remote access for critical operations. Mitigation involves promptly updating TeamViewer to version 15. 74.
AI-Powered Analysis
Technical Analysis
CVE-2026-23572 is an improper access control vulnerability classified under CWE-863, affecting TeamViewer Full and Host clients on Windows, macOS, and Linux platforms prior to version 15.74.5. The flaw arises from a bypass of the 'Allow after confirmation' feature, which is designed to require local user confirmation before granting remote session access. An authenticated attacker—who has already gained remote session authentication through valid credentials, Session Link, or Easy Access—can exploit this vulnerability to circumvent the local confirmation step, thereby gaining unauthorized access to the remote system. This bypass undermines the intended security control that prevents unauthorized remote control without explicit local user approval. The vulnerability has a CVSS v3.1 base score of 7.2, indicating high severity, with attack vector being network-based, low attack complexity, requiring high privileges (authenticated user), no user interaction, and impacting confidentiality, integrity, and availability. Although no public exploits are known at this time, the vulnerability poses a significant risk because it allows an authenticated user to escalate privileges and control a system without local user consent, potentially leading to data theft, system manipulation, or denial of service. The affected versions include all TeamViewer Full and Host clients prior to 15.74.5 across major desktop operating systems. The vulnerability was reserved in January 2026 and published in February 2026, indicating recent discovery and disclosure.
Potential Impact
For European organizations, the impact of CVE-2026-23572 can be substantial, especially for those relying heavily on TeamViewer for remote support, teleworking, or critical infrastructure management. Unauthorized access prior to local confirmation can lead to exposure of sensitive data, unauthorized system changes, and potential disruption of services. Confidentiality is at risk as attackers can access private information; integrity is compromised through unauthorized modifications; and availability may be affected if attackers disrupt or disable systems. Sectors such as finance, healthcare, manufacturing, and government agencies that use TeamViewer for remote operations are particularly vulnerable. The requirement for prior authentication limits exploitation to insiders or attackers who have obtained valid credentials, but social engineering or credential theft could facilitate this. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly. The vulnerability could also be leveraged in targeted attacks against European organizations with high-value assets or critical operations.
Mitigation Recommendations
The primary mitigation is to upgrade all TeamViewer Full and Host clients to version 15.74.5 or later, where the vulnerability is patched. Organizations should enforce strict access controls and multi-factor authentication (MFA) for TeamViewer accounts to reduce the risk of credential compromise. Review and tighten remote access policies, limiting the use of 'Allow after confirmation' configurations where possible, or replacing them with more secure alternatives. Monitor remote session logs for unusual activity and implement network segmentation to restrict TeamViewer access to trusted networks and devices. Educate users about phishing and credential theft risks to prevent unauthorized authentication. Consider deploying endpoint detection and response (EDR) solutions to detect anomalous remote access behaviors. Regularly audit TeamViewer configurations and access permissions to ensure compliance with security policies. Finally, maintain an incident response plan that includes procedures for remote access compromise scenarios.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- TV
- Date Reserved
- 2026-01-14T13:54:40.322Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69848649f9fa50a62f1d4e61
Added to database: 2/5/2026, 12:00:09 PM
Last enriched: 2/5/2026, 12:14:29 PM
Last updated: 2/5/2026, 2:15:33 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14150: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM webMethods Integration (on prem) - Integration Server
MediumCVE-2025-13491: CWE-426 Untrusted Search Path in IBM App Connect Operator
MediumCVE-2026-1927: CWE-862 Missing Authorization in wpsoul Greenshift – animation and page builder blocks
MediumCVE-2026-1523: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PRIMION DIGITEK Digitek ADT1100
HighCVE-2025-13379: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in IBM Aspera Console
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.