Description
A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause the NomadBranch.exe process to terminate via crafted requests. This can result in a denial-of-service condition of the Content Distribution Service.
Published: 2026-01-29
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial‑of‑Service of the TeamViewer Content Distribution Service
Action: Apply Update
AI Analysis

Impact

The vulnerability exists in the TeamViewer DEX Client (formerly 1E Client) through its Content Distribution Service (NomadBranch.exe). An attacker can craft requests that cause the NomadBranch.exe process to terminate, resulting in a denial‑of‑service condition for the service. The weakness is a null pointer dereference, as identified by CWE‑476, meaning that improper handling of null references can be exploited to crash the process.

Affected Systems

Systems running the TeamViewer DEX Client older than version 26.1 on Windows are affected. The service operates under NomadBranch.exe and is part of the Content Distribution Service within the TeamViewer DEX architecture.

Risk and Exploitability

The impact rating is moderate with a CVSS score of 6.5. The EPSS score is below 1%, indicating a very low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an adjacent network or local network that can reach the Content Distribution Service; the attacker must be able to send crafted requests targeting NomadBranch.exe. Because the failure is a software crash, no privilege escalation or data theft is involved, but the service becomes unavailable for legitimate users.

Generated by OpenCVE AI on April 18, 2026 at 14:36 UTC.

Remediation

Vendor Solution

Update the TeamViewer DEX Client (1E Client) to the latest available version.


OpenCVE Recommended Actions

  • Update the TeamViewer DEX Client to the latest available version, as recommended by TeamViewer
  • Restart the NomadBranch.exe process or reboot the device to enforce the update
  • Implement network segmentation or firewall rules to restrict access to the Content Distribution Service, allowing only trusted devices to communicate with NomadBranch.exe

Generated by OpenCVE AI on April 18, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Teamviewer digital Employee Experience
CPEs cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows
Teamviewer digital Employee Experience

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Teamviewer
Teamviewer dex
Vendors & Products Teamviewer
Teamviewer dex

Thu, 29 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause the NomadBranch.exe process to terminate via crafted requests. This can result in a denial-of-service condition of the Content Distribution Service.
Title Denial-of-Service in Content Distribution Service
Weaknesses CWE-476
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Microsoft Windows
Teamviewer Dex Digital Employee Experience
cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published:

Updated: 2026-01-29T16:52:56.446Z

Reserved: 2026-01-14T13:54:40.322Z

Link: CVE-2026-23565

cve-icon Vulnrichment

Updated: 2026-01-29T15:57:01.387Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T09:16:04.083

Modified: 2026-02-11T19:25:35.060

Link: CVE-2026-23565

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:45:03Z

Weaknesses