Impact
The vulnerability exists in the TeamViewer DEX Client (formerly 1E Client) through its Content Distribution Service (NomadBranch.exe). An attacker can craft requests that cause the NomadBranch.exe process to terminate, resulting in a denial‑of‑service condition for the service. The weakness is a null pointer dereference, as identified by CWE‑476, meaning that improper handling of null references can be exploited to crash the process.
Affected Systems
Systems running the TeamViewer DEX Client older than version 26.1 on Windows are affected. The service operates under NomadBranch.exe and is part of the Content Distribution Service within the TeamViewer DEX architecture.
Risk and Exploitability
The impact rating is moderate with a CVSS score of 6.5. The EPSS score is below 1%, indicating a very low probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is an adjacent network or local network that can reach the Content Distribution Service; the attacker must be able to send crafted requests targeting NomadBranch.exe. Because the failure is a software crash, no privilege escalation or data theft is involved, but the service becomes unavailable for legitimate users.
OpenCVE Enrichment