Impact
The vulnerability enables an attacker on the same network to craft UDP packets that are processed by the Content Distribution Service (NomadBranch.exe) in the TeamViewer DEX Client. By injecting malicious data, the attacker can insert, modify, or forge entries in the Nomad Branch.log file, thereby compromising the integrity of log data and undermining nonrepudiation guarantees. This flaw is a classic input validation issue (CWE‑20).
Affected Systems
Affected systems include the TeamViewer Digital Employee Experience (DEX) Client, formerly known as 1E Client, on Windows platforms. Versions before 26.1 are vulnerable; users should verify they are on version 26.1 or newer. No other products are listed.
Risk and Exploitability
The CVSS base score of 6.5 indicates a moderate severity. The EPSS score of less than 1% suggests a very low probability of exploitation in the wild, and the flaw is not currently listed in the CISA Known Exploited Vulnerabilities catalog. The attack requires the adversary to be on the adjacent network and to send crafted UDP packets to the service's handler; it does not require advanced credentials or bypass of authentication, but it can lead to misleading audit trails if the logs are relied upon for incident response.
OpenCVE Enrichment