Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Update the TeamViewer DEX client to the latest available version.
Workaround
No workaround given by the vendor.
Wed, 14 Jan 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer digital Employee Experience
|
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Teamviewer digital Employee Experience
|
Thu, 11 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Teamviewer Teamviewer dex |
|
| Vendors & Products |
Microsoft
Microsoft windows Teamviewer Teamviewer dex |
Thu, 11 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to bypass file integrity validation via a crafted request. By providing a valid hash for a malicious file, an attacker can cause the service to incorrectly validate and process the file as trusted, enabling arbitrary code execution under the Nomad Branch service context. | |
| Title | File Hash Validation Bypass in NomadBranch.exe | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2025-12-11T17:20:33.878Z
Reserved: 2025-04-30T08:08:15.948Z
Link: CVE-2025-44016
Updated: 2025-12-11T17:20:08.347Z
Status : Analyzed
Published: 2025-12-11T12:16:25.137
Modified: 2026-01-14T19:57:03.470
Link: CVE-2025-44016
No data.
OpenCVE Enrichment
Updated: 2025-12-11T16:20:01Z