No analysis available yet.
Vendor Solution
On-prem users should update to the latest available version (v15 or later). SaaS instances have been updated automatically.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 09 Jan 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer digital Employee Experience
|
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Teamviewer digital Employee Experience
|
Thu, 11 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 11 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-PatchInsights-Deploy instruction prior V15. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform. | |
| Title | Command Injection in 1E-PatchInsights-Deploy Instruction | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2025-12-11T16:17:11.880Z
Reserved: 2025-11-12T08:16:25.592Z
Link: CVE-2025-64991
Updated: 2025-12-11T16:17:08.544Z
Status : Analyzed
Published: 2025-12-11T12:16:26.063
Modified: 2026-01-09T02:09:04.810
Link: CVE-2025-64991
No data.
OpenCVE Enrichment
Updated: 2025-12-11T16:19:59Z