SB2026013032 - Multiple vulnerabilities in TeamViewer Digital Employee Experience (DEX) Client



SB2026013032 - Multiple vulnerabilities in TeamViewer Digital Employee Experience (DEX) Client

Published: January 30, 2026

Security Bulletin ID SB2026013032
Severity
Medium
Patch available
YES
Number of vulnerabilities 9
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 78% Low 22%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 9 secuirty vulnerabilities.


1) Cleartext transmission of sensitive information (CVE-ID: CVE-2026-23564)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to software uses insecure communication channel to transmit sensitive information in Content Distribution Service. A remote attacker on the local network can gain access to sensitive data.


2) NULL pointer dereference (CVE-ID: CVE-2026-23565)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in Content Distribution Service. A remote attacker on the local network can pass specially crafted data to the application and perform a denial of service (DoS) attack.


3) Input validation error (CVE-ID: CVE-2026-23566)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to the Log injection issue in Content Distribution Service UDP Handler. A remote attacker on the local network can send specially crafted data to the UDP network handler and impact log integrity and nonrepudiation.


4) Integer underflow (CVE-ID: CVE-2026-23567)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to integer underflow in Content Distribution Service UDP handler. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and cause a denial of service condition on the target system.


5) Out-of-bounds read (CVE-ID: CVE-2026-23568)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in Content Distribution Service. A remote attacker on the local network can trigger an out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.


6) Out-of-bounds read (CVE-ID: CVE-2026-23569)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in Content Distribution Service. A remote attacker on the local network can trigger an out-of-bounds read error and cause a denial of service condition on the system.


7) Input validation error (CVE-ID: CVE-2026-23570)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to missing validation of a user-controlled value in Content Distribution Service. A remote attacker on the local network can use specially crafted UDP Sync command to tamper with log timestamps.


8) Command Injection (CVE-ID: CVE-2026-23571)

The vulnerability allows a remote user to execute arbitrary commands on the system.

The vulnerability exists due to insufficient input validation in the 1E-Nomad-RunPkgStatusRequest instruction. A remote administrator can pass specially crafted data to the application and execute arbitrary commands.


9) Link following (CVE-ID: CVE-2026-23563)

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to an insecure link following issue within DeleteFileByPath instruction. A remote administrator can create a specially crafted symbolic link to a critical file on the system and delete protected system files.


Remediation

Install update from vendor's website.