Description
A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause normally encrypted UDP traffic to be sent in cleartext. This can result in disclosure of sensitive information.
Published: 2026-01-29
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

A vulnerability was identified in the TeamViewer Digital Employee Experience client, also known as the former 1E Client, specifically within its Content Distribution Service component (NomadBranch.exe). The flaw allows an attacker on a nearby network to force the service to transmit normally encrypted UDP traffic in plain text. Because this data is sent unencrypted, the attacker can capture and read sensitive information that would otherwise remain confidential. This issue is characterized as a CWE‑319, which denotes Information Disclosure due to the transmission of data in an unprotected manner.

Affected Systems

The affected products are the TeamViewer Digital Employee Experience Client for Windows, all builds before version 26.1. The software is identified in vendor information as TeamViewer DEX Client and in CPE as cpe:2.3:a:teamviewer:digital_employee_experience. Systems running those pre‑26.1 Windows builds are therefore vulnerable.

Risk and Exploitability

The CVSS base score is 6.5, indicating a moderate severity. The EPSS score is below 1 % and the vulnerability is not listed in the CISA KEV catalog, suggesting a low likelihood of being actively exploited. However, the attack requires the attacker to be on an adjacent network segment, so organizations should consider network segmentation and monitor for traffic anomalies. If the vulnerability remains unpatched, an attacker could intercept confidential communications in clear text.

Generated by OpenCVE AI on April 18, 2026 at 01:31 UTC.

Remediation

Vendor Solution

Update the TeamViewer DEX Client (1E Client) to the latest available version.


OpenCVE Recommended Actions

  • Apply the vendor’s latest update to the TeamViewer DEX Client, ensuring the build is 26.1 or newer.
  • Limit exposure by segmenting the network so that devices hosting the client are isolated from potential attackers on adjacent segments.
  • Enable or enforce encryption on all UDP traffic associated with the Content Distribution Service, or configure the system to use a secured transport if the client provides such an option.

Generated by OpenCVE AI on April 18, 2026 at 01:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Teamviewer digital Employee Experience
CPEs cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows
Teamviewer digital Employee Experience

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Teamviewer
Teamviewer dex
Vendors & Products Teamviewer
Teamviewer dex

Thu, 29 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause normally encrypted UDP traffic to be sent in cleartext. This can result in disclosure of sensitive information.
Title Transmission of Unencrypted Data in Content Distribution Service
Weaknesses CWE-319
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Microsoft Windows
Teamviewer Dex Digital Employee Experience
cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published:

Updated: 2026-01-29T16:53:10.746Z

Reserved: 2026-01-14T13:54:40.322Z

Link: CVE-2026-23564

cve-icon Vulnrichment

Updated: 2026-01-29T15:57:09.145Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T09:16:03.950

Modified: 2026-02-11T19:24:41.843

Link: CVE-2026-23564

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:45:33Z

Weaknesses