A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field. Users of 1E Client version 24.5 or higher are not affected.
History

Wed, 11 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Teamviewer digital Employee Experience
CPEs cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows
Teamviewer digital Employee Experience

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Teamviewer
Teamviewer dex
Vendors & Products Teamviewer
Teamviewer dex

Thu, 29 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field. Users of 1E Client version 24.5 or higher are not affected.
Title Command Injection in 1E-Nomad-RunPkgStatusRequest Instruction in TeamViewer DEX
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published: 2026-01-29T08:41:45.941Z

Updated: 2026-01-29T16:53:17.959Z

Reserved: 2026-01-14T13:54:40.322Z

Link: CVE-2026-23571

cve-icon Vulnrichment

Updated: 2026-01-29T15:57:21.342Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T09:16:04.867

Modified: 2026-02-11T20:22:07.887

Link: CVE-2026-23571

cve-icon Redhat

No data.