Metrics
Affected Vendors & Products
No advisories yet.
Solution
On-prem users should update to the latest available version (v17.1 or later). SaaS instances have been updated automatically.
Workaround
No workaround given by the vendor.
Fri, 09 Jan 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer digital Employee Experience
|
|
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Teamviewer digital Employee Experience
|
Thu, 11 Dec 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 11 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-SetWorkRate instruction prior V17.1. The improper handling of executable search paths could allow local attackers with write access to a PATH directory on a device to escalate privileges and execute arbitrary code as SYSTEM. | |
| Title | Privilege Escalation via Uncontrolled Search Path in 1E-Nomad-SetWorkRate instruction | |
| Weaknesses | CWE-427 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2025-12-11T14:43:39.372Z
Reserved: 2025-11-12T08:16:25.593Z
Link: CVE-2025-64994
Updated: 2025-12-11T14:43:01.698Z
Status : Analyzed
Published: 2025-12-11T12:16:26.453
Modified: 2026-01-09T02:04:09.707
Link: CVE-2025-64994
No data.
OpenCVE Enrichment
Updated: 2025-12-11T16:19:56Z