Metrics
Affected Vendors & Products
No advisories yet.
Solution
Update the TeamViewer DEX Client (1E Client) to the latest available version. Remove the instruction 1E-Nomad-RunPkgStatusRequest from DEX Portal.
Workaround
No workaround given by the vendor.
Thu, 29 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field. Users of 1E Client version 24.5 or higher are not affected. | |
| Title | Command Injection in 1E-Nomad-RunPkgStatusRequest Instruction in TeamViewer DEX | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2026-01-29T16:53:17.959Z
Reserved: 2026-01-14T13:54:40.322Z
Link: CVE-2026-23571
Updated: 2026-01-29T15:57:21.342Z
Status : Awaiting Analysis
Published: 2026-01-29T09:16:04.867
Modified: 2026-01-29T16:31:00.867
Link: CVE-2026-23571
No data.
OpenCVE Enrichment
No data.