No analysis available yet.
Vendor Solution
On-prem users should update to the latest available versions. SaaS instances have been updated automatically.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 09 Jan 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer digital Employee Experience
|
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Teamviewer digital Employee Experience
|
Thu, 11 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 11 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-ConfigMgrConsoleExtensions instructions. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform. | |
| Title | Command Injection in 1E-ConfigMgrConsoleExtensions Instructions | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2025-12-11T14:44:21.214Z
Reserved: 2025-11-12T08:16:25.592Z
Link: CVE-2025-64993
Updated: 2025-12-11T14:44:19.032Z
Status : Analyzed
Published: 2025-12-11T12:16:26.320
Modified: 2026-01-09T02:06:24.377
Link: CVE-2025-64993
No data.
OpenCVE Enrichment
Updated: 2025-12-11T16:19:59Z