Description
A missing validation of a user-controlled value in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to tamper with log timestamps via crafted UDP Sync command. This could result in forged or nonsensical datetime prefixes and compromising log integrity and forensic correlation.
Published: 2026-01-29
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Log integrity and forensic correlation compromise
Action: Immediate Patch
AI Analysis

Impact

A missing validation check in the TeamViewer DEX Client allows an attacker on the same local network to forge timestamps in logs by sending a crafted UDP Sync command to the Content Distribution Service (NomadBranch.exe). This manipulation can create forged or nonsensical datetime prefixes, undermining the trustworthiness of audit trails, incident response records, and forensic investigations. The vulnerability does not grant code execution or system takeover, but it erodes confidence in system monitoring and log integrity.

Affected Systems

The vulnerability affects the TeamViewer Digital Employee Experience (DEX) Client, formerly known as the 1E Client, on Windows operating systems. It applies to all releases prior to version 26.1 of the client. Devices running older versions of the client connected to a local or adjacent network are exposed.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires an adjacent network attacker to send a specially-crafted UDP Sync command, implying that the susceptible systems must accept UDP traffic from the local network or a compromised machine on the same subnet. Attackers in this setting can tamper with log timestamps but would not gain broader system control.

Generated by OpenCVE AI on April 18, 2026 at 14:36 UTC.

Remediation

Vendor Solution

Update the TeamViewer DEX Client (1E Client) to the latest available version.


OpenCVE Recommended Actions

  • Apply the latest TeamViewer DEX Client update, which includes the missing input validation fix
  • Block or restrict UDP traffic to the NomadBranch.exe port from local or adjacent networks using firewall rules to limit potential attackers
  • Segregate or isolate the device running the TeamViewer DEX Client from the rest of the local network or place it in a dedicated VLAN to reduce exposure to adjacent network threats

Generated by OpenCVE AI on April 18, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Teamviewer digital Employee Experience
CPEs cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows
Teamviewer digital Employee Experience

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Teamviewer
Teamviewer dex
Vendors & Products Teamviewer
Teamviewer dex

Thu, 29 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description A missing validation of a user-controlled value in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to tamper with log timestamps via crafted UDP Sync command. This could result in forged or nonsensical datetime prefixes and compromising log integrity and forensic correlation.
Title Log timestamp tampering vulnerability in Content Distribution Service
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Subscriptions

Microsoft Windows
Teamviewer Dex Digital Employee Experience
cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published:

Updated: 2026-01-29T15:45:56.209Z

Reserved: 2026-01-14T13:54:40.322Z

Link: CVE-2026-23570

cve-icon Vulnrichment

Updated: 2026-01-29T15:41:18.715Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T09:16:04.737

Modified: 2026-02-11T20:17:17.537

Link: CVE-2026-23570

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:45:03Z

Weaknesses