Improper Session Handling in TeamViewer Desktop Application
CVE-2019-19362

4.3MEDIUM

Key Information:

Vendor

Teamviewer

Vendor
CVE Published:
2 December 2019

What is CVE-2019-19362?

A vulnerability was identified in the Chat feature of the TeamViewer desktop application, wherein communications are stored in Windows main memory upon user login. If a user logs out or deletes the conversation history without exiting the application, the data remains retained in memory and can potentially be accessed by a local user with equivalent or elevated privileges. This flaw highlights the importance of thorough session management and data wiping processes to prevent unauthorized access to sensitive information.

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.