Search criteria
2 vulnerabilities found for Remote (Full Client) by TeamViewer
CVE-2024-2451 (GCVE-0-2024-2451)
Vulnerability from cvelistv5 – Published: 2024-05-28 14:27 – Updated: 2024-08-01 19:11
VLAI?
Summary
Improper fingerprint validation in the TeamViewer Client (Full & Host) prior Version 15.54 for Windows and macOS allows an attacker with administrative user rights to further elevate privileges via executable sideloading.
Severity ?
6.4 (Medium)
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TeamViewer | Remote (Full Client) |
Affected:
15.48 , < 15.54
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Maximilian Barz
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:teamviewer:remote:15.48:*:*:*:*:*:*:*",
"cpe:2.3:a:teamviewer:remote:15.51:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "remote",
"vendor": "teamviewer",
"versions": [
{
"lessThan": "15.54",
"status": "affected",
"version": "15.48",
"versionType": "custom"
},
{
"lessThan": "15.54",
"status": "affected",
"version": "15.51",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-2451",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-28T16:18:24.894767Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-24T17:59:43.200Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:11:53.533Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1004/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "Remote (Full Client)",
"vendor": "TeamViewer",
"versions": [
{
"lessThan": "15.54",
"status": "affected",
"version": "15.48",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "Remote (Host)",
"vendor": "TeamViewer",
"versions": [
{
"lessThan": "15.54",
"status": "affected",
"version": "15.48",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"MacOS"
],
"product": "Remote (Full Client)",
"vendor": "TeamViewer",
"versions": [
{
"lessThan": "15.54",
"status": "affected",
"version": "15.51",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"MacOS"
],
"product": "Remote (Host)",
"vendor": "TeamViewer",
"versions": [
{
"lessThan": "15.54",
"status": "affected",
"version": "15.51",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Maximilian Barz"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper fingerprint validation in the TeamViewer Client (Full \u0026amp; Host) prior Version 15.54 for Windows and macOS allows an attacker with administrative user rights to further elevate privileges via executable sideloading."
}
],
"value": "Improper fingerprint validation in the TeamViewer Client (Full \u0026 Host) prior Version 15.54 for Windows and macOS allows an attacker with administrative user rights to further elevate privileges via executable sideloading."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "CWE-347 Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-28T14:27:25.918Z",
"orgId": "13430f76-86eb-43b2-a71c-82c956ef31b6",
"shortName": "TV"
},
"references": [
{
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1004/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to the latest version (15.54 or higher)"
}
],
"value": "Update to the latest version (15.54 or higher)"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Improper fingerprint validation in the TeamViewer Client",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "13430f76-86eb-43b2-a71c-82c956ef31b6",
"assignerShortName": "TV",
"cveId": "CVE-2024-2451",
"datePublished": "2024-05-28T14:27:25.918Z",
"dateReserved": "2024-03-14T13:47:04.908Z",
"dateUpdated": "2024-08-01T19:11:53.533Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-2451 (GCVE-0-2024-2451)
Vulnerability from nvd – Published: 2024-05-28 14:27 – Updated: 2024-08-01 19:11
VLAI?
Summary
Improper fingerprint validation in the TeamViewer Client (Full & Host) prior Version 15.54 for Windows and macOS allows an attacker with administrative user rights to further elevate privileges via executable sideloading.
Severity ?
6.4 (Medium)
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TeamViewer | Remote (Full Client) |
Affected:
15.48 , < 15.54
(custom)
|
|||||||||||||||||
|
|||||||||||||||||||
Credits
Maximilian Barz
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:teamviewer:remote:15.48:*:*:*:*:*:*:*",
"cpe:2.3:a:teamviewer:remote:15.51:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "remote",
"vendor": "teamviewer",
"versions": [
{
"lessThan": "15.54",
"status": "affected",
"version": "15.48",
"versionType": "custom"
},
{
"lessThan": "15.54",
"status": "affected",
"version": "15.51",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-2451",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-28T16:18:24.894767Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-24T17:59:43.200Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T19:11:53.533Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1004/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "Remote (Full Client)",
"vendor": "TeamViewer",
"versions": [
{
"lessThan": "15.54",
"status": "affected",
"version": "15.48",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "Remote (Host)",
"vendor": "TeamViewer",
"versions": [
{
"lessThan": "15.54",
"status": "affected",
"version": "15.48",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"MacOS"
],
"product": "Remote (Full Client)",
"vendor": "TeamViewer",
"versions": [
{
"lessThan": "15.54",
"status": "affected",
"version": "15.51",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"MacOS"
],
"product": "Remote (Host)",
"vendor": "TeamViewer",
"versions": [
{
"lessThan": "15.54",
"status": "affected",
"version": "15.51",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Maximilian Barz"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Improper fingerprint validation in the TeamViewer Client (Full \u0026amp; Host) prior Version 15.54 for Windows and macOS allows an attacker with administrative user rights to further elevate privileges via executable sideloading."
}
],
"value": "Improper fingerprint validation in the TeamViewer Client (Full \u0026 Host) prior Version 15.54 for Windows and macOS allows an attacker with administrative user rights to further elevate privileges via executable sideloading."
}
],
"impacts": [
{
"capecId": "CAPEC-233",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-233 Privilege Escalation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "CWE-347 Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-05-28T14:27:25.918Z",
"orgId": "13430f76-86eb-43b2-a71c-82c956ef31b6",
"shortName": "TV"
},
"references": [
{
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1004/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to the latest version (15.54 or higher)"
}
],
"value": "Update to the latest version (15.54 or higher)"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Improper fingerprint validation in the TeamViewer Client",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "13430f76-86eb-43b2-a71c-82c956ef31b6",
"assignerShortName": "TV",
"cveId": "CVE-2024-2451",
"datePublished": "2024-05-28T14:27:25.918Z",
"dateReserved": "2024-03-14T13:47:04.908Z",
"dateUpdated": "2024-08-01T19:11:53.533Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}