Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Update the TeamViewer DEX Client (1E Client) to the latest available version.
Workaround
No workaround given by the vendor.
Wed, 11 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Teamviewer digital Employee Experience |
|
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Teamviewer digital Employee Experience |
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 29 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An out-of-bounds read vulnerability in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause information disclosure or denial-of-service via a special crafted packet. The leaked memory could be used to bypass ASLR and facilitate further exploitation. | |
| Title | Out-of-bounds read vulnerability in Content Distribution Service | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2026-01-29T16:04:44.937Z
Reserved: 2026-01-14T13:54:40.322Z
Link: CVE-2026-23568
Updated: 2026-01-29T16:04:40.962Z
Status : Analyzed
Published: 2026-01-29T09:16:04.473
Modified: 2026-02-11T20:09:18.650
Link: CVE-2026-23568
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:43:22Z