A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to bypass file integrity validation via a crafted request. By providing a valid hash for a malicious file, an attacker can cause the service to incorrectly validate and process the file as trusted, enabling arbitrary code execution under the Nomad Branch service context.
History

Thu, 11 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Teamviewer
Teamviewer dex
Vendors & Products Microsoft
Microsoft windows
Teamviewer
Teamviewer dex

Thu, 11 Dec 2025 11:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to bypass file integrity validation via a crafted request. By providing a valid hash for a malicious file, an attacker can cause the service to incorrectly validate and process the file as trusted, enabling arbitrary code execution under the Nomad Branch service context.
Title File Hash Validation Bypass in NomadBranch.exe
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published: 2025-12-11T11:24:37.520Z

Updated: 2025-12-11T17:20:33.878Z

Reserved: 2025-04-30T08:08:15.948Z

Link: CVE-2025-44016

cve-icon Vulnrichment

Updated: 2025-12-11T17:20:08.347Z

cve-icon NVD

Status : Received

Published: 2025-12-11T12:16:25.137

Modified: 2025-12-11T12:16:25.137

Link: CVE-2025-44016

cve-icon Redhat

No data.