Impact
A vulnerability was identified in the TeamViewer Digital Employee Experience client, also known as the former 1E Client, specifically within its Content Distribution Service component (NomadBranch.exe). The flaw allows an attacker on a nearby network to force the service to transmit normally encrypted UDP traffic in plain text. Because this data is sent unencrypted, the attacker can capture and read sensitive information that would otherwise remain confidential. This issue is characterized as a CWE‑319, which denotes Information Disclosure due to the transmission of data in an unprotected manner.
Affected Systems
The affected products are the TeamViewer Digital Employee Experience Client for Windows, all builds before version 26.1. The software is identified in vendor information as TeamViewer DEX Client and in CPE as cpe:2.3:a:teamviewer:digital_employee_experience. Systems running those pre‑26.1 Windows builds are therefore vulnerable.
Risk and Exploitability
The CVSS base score is 6.5, indicating a moderate severity. The EPSS score is below 1 % and the vulnerability is not listed in the CISA KEV catalog, suggesting a low likelihood of being actively exploited. However, the attack requires the attacker to be on an adjacent network segment, so organizations should consider network segmentation and monitor for traffic anomalies. If the vulnerability remains unpatched, an attacker could intercept confidential communications in clear text.
OpenCVE Enrichment