Impact
An improper access control flaw in TeamViewer Full and Host clients allows an authenticated remote user to bypass the "Allow after confirmation" setting, enabling remote control before local confirmation. This results in unauthorized access and is classified as a CWE-863 weakness.
Affected Systems
TeamViewer Full and Host clients on Windows, macOS, and Linux before version 15.74.5, affecting the TeamViewer:One, TeamViewer:Remote, and TeamViewer:Tensor products.
Risk and Exploitability
The CVSS score of 7.2 signals a high severity vulnerability, while an EPSS score of less than 1% indicates a low probability of exploitation and the vulnerability is not listed in the KEV catalog. Exploitation requires an authenticated remote session established through ID/password, Session Link, or Easy Access. Once authenticated, the attacker can bypass local confirmation and gain remote control, making the risk significant for enabled remote sessions.
OpenCVE Enrichment