Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Update the TeamViewer DEX Client (1E Client) to the latest available version.
Workaround
No workaround given by the vendor.
Wed, 11 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Teamviewer digital Employee Experience |
|
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Teamviewer digital Employee Experience |
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 29 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Link Resolution Before File Access (invoked by 1E‑Explorer‑TachyonCore‑DeleteFileByPath instruction) in TeamViewer DEX - 1E Client before version 26.1 on Windows allows a low‑privileged local attacker to delete protected system files via a crafted RPC control junction or symlink that is followed when the delete instruction executes. | |
| Title | Privilege escalation in TeamViewer DEX via DeleteFileByPath instruction | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2026-01-29T16:53:26.845Z
Reserved: 2026-01-14T13:54:40.321Z
Link: CVE-2026-23563
Updated: 2026-01-29T15:57:29.097Z
Status : Analyzed
Published: 2026-01-29T09:16:03.793
Modified: 2026-02-11T19:20:41.057
Link: CVE-2026-23563
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:43:52Z