Security bulletins

TeamViewer’s security bulletins keep you up-to-date with the latest security news and advisories related to our software.

Report a security issue

TeamViewer’s security team will investigate every submission in our Vulnerability Disclosure Program.

Understand our security bulletins

For reference, TeamViewer ranks security bulletins with priority levels from low to critical.

Subscribe to updates

Stay up-to-date and receive all TeamViewer security bulletins directly via email.

Security bulletins

Bulletin ID Date Published Assigned CVE Title CVSS Priority Affected Products Last Update
1E-2025-2001 Mar 12, 2025 CVE-2025-1683 Symbolic link exploit in 1E client 7.8 (High) Important
  • 1E Client – Nomad Module
  • 1E Content Distribution Tools v25.1
Mar 13, 2025
TV-2025-1001 Jan 28, 2025 CVE-2025-0065 Improper Neutralization of Argument Delimiters in TeamViewer Clients 7.8 (High) Important
  • TeamViewer Remote
  • TeamViewer Tensor
Jan 28, 2025
TV-2024-1008 Dec 11, 2024 CVE-2024-12363 Insufficient permissions in the “TeamViewer Patch & Asset Management” component. 7.1 (High) Important
  • TeamViewer Remote Management: Patch Management (Windows)
Dec 11, 2024
TV-2024-1006 Sep 25, 2024 CVE-2024-7479, CVE-2024-7481 Improper signature verification of driver installation in TeamViewer Remote clients 8.8 (High) Important
  • TeamViewer Remote
  • TeamViewer Tensor
Sep 25, 2024
TV-2024-1007 Aug 27, 2024 CVE-2024-6053 Improper access control in the clipboard synchronization feature in TeamViewer Remote full client and TeamViewer Meeting 4.3 (Medium) Moderate
  • TeamViewer Meeting
  • TeamViewer full client
Aug 27, 2024
1E-2024-2001 Jul 31, 2024 CVE-2024-7211 1E platform URL redirection 4.7 (Medium) Moderate
  • 1E Platform
Aug 2, 2024
TV-2024-1005 Jun 27, 2024 TeamViewer IT security update Informative
  • No product, platform, or customer data affected
Jul 4, 2024
TV-2024-1004 May 28, 2024 CVE-2024-2451 Improper fingerprint validation in TeamViewer client prior Version 15.54 6.4 (medium) Moderate
  • TeamViewer Remote full client
  • TeamViewer Remote Host
May 28, 2024
TV-2024-1003 Apr 10, 2024 CVE-2024-3094 XZ Utils backdoor – TeamViewer services are not affected Informative Apr 10, 2024
TV-2024-1002 Mar 26, 2024 CVE-2024-1933 Improper symlink resolution in TeamViewer Remote client for macOS 7.1 (high) Moderate
  • TeamViewer Remote client
Mar 26, 2024
TV-2024-1001 Feb 27, 2024 CVE-2024-0819 Incomplete protection of personal password settings 7.3 (high) Important
  • TeamViewer Remote full client
  • TeamViewer Remote Host
Feb 27, 2024
1E-2023-2003 Nov 6, 2023 CVE-2023-45161 Improper input validation in 1E network product pack 9.9 (Critical) Critical
  • 1E Platform – Exchange Product Pack – Network
Nov 21, 2023
1E-2023-2005 Nov 6, 2023 CVE-2023-45163 Improper input validation in 1E platform network product pack 9.9 (Critical) Critical
  • 1E Platform – Exchange Product Pack – Network
Nov 21, 2023
1E-2023-2006 Nov 6, 2023 CVE-2023-5964 Improper Input validation in the end-user interaction product pack available on the 1E exchange 9.9 (Critical) Critical
  • 1E Platform – Exchange Product Pack – End-User Interaction
Nov 21, 2023
TV-2023-1003 Oct 20, 2023 Libwebp vulnerabilities CVE-2023-4863 and CVE-2023-41064 Important
  • TeamViewer Frontline
Oct 20, 2023
1E-2023-2004 Oct 13, 2023 CVE-2023-45162 Improper neutralization of special elements in 1E platform 9.9 (Critical) Critical
  • 1E Platform
Oct 19, 2023
TV-2023-1002 Oct 11, 2023 CVE-2023-38545 Hotfix for curl and libcurl vulnerability Important
  • TeamViewer Remote
  • TeamViewer Tensor
  • TeamViewer Frontline
  • TeamViewer Remote Management
Oct 11, 2023
1E-2023-2001 Oct 5, 2023 CVE-2023-45159 Improper link resolution in 1E client 8.4 (High) Important
  • 1E Client for Windows
Oct 19, 2023
1E-2023-2002 Oct 5, 2023 CVE-2023-45160 Insecure file handling in 1E client for windows 8.8 (High) Important
  • 1E Client for Windows
Nov 2, 2023
TV-2023-1001 Jun 14, 2023 CVE-2023-0837 Incomplete protection of local device settings 6.6 (medium) Moderate
  • TeamViewer Remote for Windows
  • TeamViewer Remote for macOS
Jun 14, 2023
TV-2022-1001 Jun 14, 2023 CVE-2022-23242 TeamViewer Linux – Deletion command not properly executed after process crash 6.3 (medium) Moderate
  • TeamViewer for Linux
Jun 14, 2023
TV-2022-1002 Mar 22, 2022 CVE-2022-0778 Updates for OpenSSL vulnerabilities Moderate
  • TeamViewer Windows Host IoT
  • TeamViewer IoT Agent for Linux
  • TeamViewer for Linux
  • TeamViewer Android Apps
Jan 10, 2024
TV-2021-1002 Dec 13, 2021 Server-side hotfix for log4J issue Low
  • TeamViewer IoT
  • TeamViewer Engage
  • TeamViewer Frontline
Dec 29, 2021
TV-2021-1001 Oct 19, 2021 Welcome to the TeamViewer Security Bulletins Informative Oct 24, 2023
1E-2020-2001 Dec 29, 2020 CVE-2020-27645 Unquoted search path in 1E client 8.8 (High) Important
  • 1E Client for Windows
Nov 21, 2024
1E-2020-2002 Dec 29, 2020 CVE-2020-27644 1E client enables privilege escalation 8.8 (High) Important
  • 1E Client for Windows
Dec 29, 2020
1E-2020-2003 Dec 29, 2020 CVE-2020-27643 Improper link resolution in 1E client 6.5 (Medium) Moderate
  • 1E Client for Windows
Dec 29, 2020
1E-2020-2004 Dec 29, 2020 CVE-2020-16268 Privilege escalation in 1E client 8.8 (High) Important
  • 1E Client for Windows
Dec 29, 2020

Security bulletin priority rating

  • Critical • Red

    A critical priority is assigned to a problem that touches a core function of TeamViewer’s software or services, and that could have a critical impact on your security posture (such as a RCE vulnerability “in the wild”). We recommend following our communication closely and implementing all advised measures. This will likely include an immediate update of the TeamViewer client.

  • Important • Orange

    An important priority is assigned to a problem of TeamViewer’s software or services that could significantly impair your security posture (such as a privilege escalation vulnerability easy to reproduce). We recommend implementing all advised measures. This will likely include an immediate update of the TeamViewer client.

  • Moderate • Yellow

    A moderate priority is assigned to a problem of TeamViewer’s software or services that could impair your local security posture only under specific circumstances. We recommend implementing all advised measures. This will likely include an update of the TeamViewer client at the earliest convenience.

  • Low • Green

    A low priority is assigned to a problem that is unlikely to be reproduced and requires privileged local access to be exploited. We recommend implementing all advised measures. This will likely include an update of the TeamViewer client during the next update cycle. The low priority category also includes general security-related announcements by TeamViewer.

Hall of Fame

2024

Lukas Radermacher

Cybersecurity Student

Nils Hanff

Cybersecurity Student

Aaron Schlitt

Cybersecurity Student

2023

2022

Mathias Maidana

Security Researcher

2021

Daniel Szameitat

Member of E.ON Pentesting Team

Do you want to report a security issue?

TeamViewer’s security team will investigate every submission in our Vulnerability Disclosure Program (VDP).