TeamViewer and OpenSSL
TeamViewer sessions and passwords are not affected by the Heartbleed vulnerability in OpenSSL. The TeamViewer client software comes with its own encryption component that is not susceptible to the Heartbleed vulnerability.
TeamViewer’s website as well as web components like the TeamViewer Management Console rely on Microsoft products for encryption. These are also not affected due to their own encryption component called Secure Channel.
Components of the TeamViewer infrastructure that make use of OpenSSL have already been patched and are no longer vulnerable. Logs showed no evidence of any compromise.
Customers or prospective customers?
Submit a ticket
Do you have any further questions?