Improper Session Handling in TeamViewer Desktop Application
CVE-2019-19362

4.3MEDIUM

Key Information:

Vendor

Teamviewer

Vendor
CVE Published:
2 December 2019

What is CVE-2019-19362?

A vulnerability was identified in the Chat feature of the TeamViewer desktop application, wherein communications are stored in Windows main memory upon user login. If a user logs out or deletes the conversation history without exiting the application, the data remains retained in memory and can potentially be accessed by a local user with equivalent or elevated privileges. This flaw highlights the importance of thorough session management and data wiping processes to prevent unauthorized access to sensitive information.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.