Remote Code Execution Vulnerability in TeamViewer 15.16.8.0
CVE-2021-34859

7.8HIGH

Key Information:

Vendor

Teamviewer

Vendor
CVE Published:
25 October 2021

What is CVE-2021-34859?

This vulnerability enables remote attackers to execute arbitrary code on vulnerable TeamViewer installations by exploiting a flaw in the parsing of TVS files. The exploitation requires user interaction, where the target must visit a malicious web page or open a malformed file. The root cause of this issue is a lack of adequate validation for user-supplied data, potentially causing memory corruption. Successful exploitation allows an attacker to execute code within the context of the affected process.

Affected Version(s)

TeamViewer 15.16.8.0

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Mat Powell of Trend Micro Zero Day Initiative
.