Security bulletins

TeamViewer’s security bulletins keep you up-to-date with the latest security news and advisories related to our software.

Report a security issue

TeamViewer’s security team will investigate every submission in our Vulnerability Disclosure Program.

Understand our security bulletins

For reference, TeamViewer ranks security bulletins with priority levels from low to critical.

Subscribe to updates

Stay up-to-date and receive all TeamViewer security bulletins directly via email.

Security bulletins

Bulletin ID Date Published Assigned CVE Titolo CVSS Priorità Affected Products Last Update
1E-2025-2001 12 mar 2025 CVE-2025-1683 Symbolic link exploit in 1E client 7.8 (High) alta
  • 1E Client – Nomad Module
  • 1E Content Distribution Tools v25.1
13 mar 2025
TV-2025-1001 28 gen 2025 CVE-2025-0065 Improper Neutralization of Argument Delimiters in TeamViewer Clients 7.8 (High) alta
  • TeamViewer Remote
  • TeamViewer Tensor
28 gen 2025
TV-2024-1008 11 dic 2024 CVE-2024-12363 Insufficient permissions in the “TeamViewer Patch & Asset Management” component. 7.1 (High) alta
  • TeamViewer Remote Management: Patch Management (Windows)
11 dic 2024
TV-2024-1006 25 set 2024 CVE-2024-7479, CVE-2024-7481 Improper signature verification of driver installation in TeamViewer Remote clients 8.8 (High) alta
  • TeamViewer Remote
  • TeamViewer Tensor
25 set 2024
TV-2024-1007 27 ago 2024 CVE-2024-6053 Improper access control in the clipboard synchronization feature in TeamViewer Remote full client and TeamViewer Meeting 4.3 (Medium) media
  • TeamViewer Meeting
  • TeamViewer full client
27 ago 2024
1E-2024-2001 31 lug 2024 CVE-2024-7211 1E platform URL redirection 4.7 (Medium) media
  • 1E Platform
2 ago 2024
TV-2024-1005 27 giu 2024 TeamViewer IT security update Informative
  • No product, platform, or customer data affected
4 lug 2024
TV-2024-1004 28 mag 2024 CVE-2024-2451 Improper fingerprint validation in TeamViewer client prior Version 15.54 6.4 (medium) media
  • TeamViewer Remote full client
  • TeamViewer Remote Host
28 mag 2024
TV-2024-1003 10 apr 2024 CVE-2024-3094 XZ Utils backdoor – TeamViewer services are not affected Informative 10 apr 2024
TV-2024-1002 26 mar 2024 CVE-2024-1933 Improper symlink resolution in TeamViewer Remote client for macOS 7.1 (high) media
  • TeamViewer Remote client
26 mar 2024
TV-2024-1001 27 feb 2024 CVE-2024-0819 Incomplete protection of personal password settings 7.3 (high) alta
  • TeamViewer Remote full client
  • TeamViewer Remote Host
27 feb 2024
1E-2023-2003 6 nov 2023 CVE-2023-45161 Improper input validation in 1E network product pack 9.9 (Critical) Critical
  • 1E Platform – Exchange Product Pack – Network
21 nov 2023
1E-2023-2005 6 nov 2023 CVE-2023-45163 Improper input validation in 1E platform network product pack 9.9 (Critical) Critical
  • 1E Platform – Exchange Product Pack – Network
21 nov 2023
1E-2023-2006 6 nov 2023 CVE-2023-5964 Improper Input validation in the end-user interaction product pack available on the 1E exchange 9.9 (Critical) Critical
  • 1E Platform – Exchange Product Pack – End-User Interaction
21 nov 2023
TV-2023-1003 20 ott 2023 Libwebp vulnerabilities CVE-2023-4863 and CVE-2023-41064 alta
  • TeamViewer Frontline
20 ott 2023
1E-2023-2004 13 ott 2023 CVE-2023-45162 Improper neutralization of special elements in 1E platform 9.9 (Critical) Critical
  • 1E Platform
19 ott 2023
TV-2023-1002 11 ott 2023 CVE-2023-38545 Hotfix for curl and libcurl vulnerability alta
  • TeamViewer Remote
  • TeamViewer Tensor
  • TeamViewer Frontline
  • TeamViewer Remote Management
11 ott 2023
1E-2023-2001 5 ott 2023 CVE-2023-45159 Improper link resolution in 1E client 8.4 (High) alta
  • 1E Client for Windows
19 ott 2023
1E-2023-2002 5 ott 2023 CVE-2023-45160 Insecure file handling in 1E client for windows 8.8 (High) alta
  • 1E Client for Windows
2 nov 2023
TV-2023-1001 14 giu 2023 CVE-2023-0837 Incomplete protection of local device settings 6.6 (medium) media
  • TeamViewer Remote for Windows
  • TeamViewer Remote for macOS
14 giu 2023
TV-2022-1001 14 giu 2023 CVE-2022-23242 TeamViewer Linux – Deletion command not properly executed after process crash 6.3 (medium) media
  • TeamViewer for Linux
14 giu 2023
TV-2022-1002 22 mar 2022 CVE-2022-0778 Updates for OpenSSL vulnerabilities media
  • TeamViewer Windows Host IoT
  • TeamViewer IoT Agent for Linux
  • TeamViewer for Linux
  • TeamViewer Android Apps
10 gen 2024
TV-2021-1002 13 dic 2021 Server-side hotfix for log4J issue bassa
  • TeamViewer IoT
  • TeamViewer Engage
  • TeamViewer Frontline
29 dic 2021
TV-2021-1001 19 ott 2021 Welcome to the TeamViewer Security Bulletins Informative 24 ott 2023
1E-2020-2001 29 dic 2020 CVE-2020-27645 Unquoted search path in 1E client 8.8 (High) alta
  • 1E Client for Windows
21 nov 2024
1E-2020-2002 29 dic 2020 CVE-2020-27644 1E client enables privilege escalation 8.8 (High) alta
  • 1E Client for Windows
29 dic 2020
1E-2020-2003 29 dic 2020 CVE-2020-27643 Improper link resolution in 1E client 6.5 (Medium) media
  • 1E Client for Windows
29 dic 2020
1E-2020-2004 29 dic 2020 CVE-2020-16268 Privilege escalation in 1E client 8.8 (High) alta
  • 1E Client for Windows
29 dic 2020

Security bulletin priority rating

  • Critical • Red

    A critical priority is assigned to a problem that touches a core function of TeamViewer’s software or services, and that could have a critical impact on your security posture (such as a RCE vulnerability “in the wild”). We recommend following our communication closely and implementing all advised measures. This will likely include an immediate update of the TeamViewer client.

  • Important • Orange

    An important priority is assigned to a problem of TeamViewer’s software or services that could significantly impair your security posture (such as a privilege escalation vulnerability easy to reproduce). We recommend implementing all advised measures. This will likely include an immediate update of the TeamViewer client.

  • Moderate • Yellow

    A moderate priority is assigned to a problem of TeamViewer’s software or services that could impair your local security posture only under specific circumstances. We recommend implementing all advised measures. This will likely include an update of the TeamViewer client at the earliest convenience.

  • Low • Green

    A low priority is assigned to a problem that is unlikely to be reproduced and requires privileged local access to be exploited. We recommend implementing all advised measures. This will likely include an update of the TeamViewer client during the next update cycle. The low priority category also includes general security-related announcements by TeamViewer.

Hall of Fame

2024

Lukas Radermacher

Cybersecurity Student

Nils Hanff

Cybersecurity Student

Aaron Schlitt

Cybersecurity Student

2023

2022

Mathias Maidana

Security Researcher

2021

Daniel Szameitat

Member of E.ON Pentesting Team

Do you want to report a security issue?

TeamViewer’s security team will investigate every submission in our Vulnerability Disclosure Program (VDP).