Improper Session Handling in TeamViewer Desktop Application
CVE-2019-19362
4.3MEDIUM
What is CVE-2019-19362?
A vulnerability was identified in the Chat feature of the TeamViewer desktop application, wherein communications are stored in Windows main memory upon user login. If a user logs out or deletes the conversation history without exiting the application, the data remains retained in memory and can potentially be accessed by a local user with equivalent or elevated privileges. This flaw highlights the importance of thorough session management and data wiping processes to prevent unauthorized access to sensitive information.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
