Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
Update the TeamViewer DEX Client (1E Client) to the latest available version.
Workaround
No workaround given by the vendor.
Wed, 11 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Teamviewer digital Employee Experience |
|
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Teamviewer digital Employee Experience |
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 29 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An out-of-bounds read vulnerability in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows a remote attacker to leak stack memory and cause a denial of service via a crafted request. The leaked stack memory could be used to bypass ASLR remotely and facilitate exploitation of other vulnerabilities on the affected system. | |
| Title | Out-of-bounds read vulnerability in Content Distribution Service | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2026-01-29T16:00:12.743Z
Reserved: 2026-01-14T13:54:40.322Z
Link: CVE-2026-23569
Updated: 2026-01-29T16:00:07.495Z
Status : Analyzed
Published: 2026-01-29T09:16:04.603
Modified: 2026-02-11T20:10:07.267
Link: CVE-2026-23569
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:43:23Z