A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-ConfigMgrConsoleExtensions instructions. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
History

Thu, 11 Dec 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Teamviewer
Teamviewer dex
Vendors & Products Teamviewer
Teamviewer dex

Thu, 11 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 11:45:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-ConfigMgrConsoleExtensions instructions. Improper input validation, allowing authenticated attackers with Actioner privileges to inject arbitrary commands. Exploitation enables remote execution of elevated commands on devices connected to the platform.
Title Command Injection in 1E-ConfigMgrConsoleExtensions Instructions
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published: 2025-12-11T11:29:09.540Z

Updated: 2025-12-11T14:44:21.214Z

Reserved: 2025-11-12T08:16:25.592Z

Link: CVE-2025-64993

cve-icon Vulnrichment

Updated: 2025-12-11T14:44:19.032Z

cve-icon NVD

Status : Received

Published: 2025-12-11T12:16:26.320

Modified: 2025-12-11T12:16:26.320

Link: CVE-2025-64993

cve-icon Redhat

No data.