No analysis available yet.
Vendor Solution
On-prem users should update to the latest available version (v17.1 or later). SaaS instances have been updated automatically.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 09 Jan 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer digital Employee Experience
|
|
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Teamviewer digital Employee Experience
|
Thu, 11 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 11 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-SetWorkRate instruction prior V17.1. The improper handling of executable search paths could allow local attackers with write access to a PATH directory on a device to escalate privileges and execute arbitrary code as SYSTEM. | |
| Title | Privilege Escalation via Uncontrolled Search Path in 1E-Nomad-SetWorkRate instruction | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2025-12-11T14:43:39.372Z
Reserved: 2025-11-12T08:16:25.593Z
Link: CVE-2025-64994
Updated: 2025-12-11T14:43:01.698Z
Status : Analyzed
Published: 2025-12-11T12:16:26.453
Modified: 2026-01-09T02:04:09.707
Link: CVE-2025-64994
No data.
OpenCVE Enrichment
Updated: 2025-12-11T16:19:56Z