24 сент. 2025 г.
TeamViewer partnered with YesWeHack to host a live hacking event during NULLCON Berlin, inviting ethical hackers to test selected components of its products as part of the company’s commitment to collaborative cybersecurity and community engagement.
From September 4-5, TeamViewer and YesWeHack hosted a two-day live hacking event at the NULLCON Security Conference in Berlin. The event brought together some of Europe’s top ethical hackers to test selected TeamViewer systems to strengthen proactive vulnerability management. Through this engagement, TeamViewer aimed to deepen ties with the security community and raise awareness of our bug bounty program as part of our broader cybersecurity strategy.
This year’s scope was deliberately designed to focus on new and strategically relevant components, including TeamViewer’s new Digital Employee Experience (DEX) solution and expanded AI capabilities. To accommodate the diverse interests and expertise of participating hunters, TeamViewer also included its desktop clients, as well as wildcard targets across TeamViewer Remote and our enterprise-grade solution, Tensor. Dedicated internal processes and cross-functional teams were prepared in advance to ensure rapid analysis and resolution of findings during the event itself.
“Some of the vulnerabilities reported introduced entirely new angles for us to explore, which is both exciting and humbling. It really underscores the importance of responsible disclosure and the power of collaborative security. We’re not just fixing bugs, we’re evolving our mindset and approach to security,” said Patricia Leppert, Team Manager, Customer Trust & Security.
Security is a top priority for TeamViewer, as our remote access solutions handle sensitive data across critical industries. Our experts apply advanced protection measures and operate a specialized security organization with 24/7 monitoring and global compliance.
Cassim Khouani, also known by his online alias Aituglo, took first place and received the award for Biggest Impact. He said the experience was particularly interesting, as he was familiar with the TeamViewer product but had never tried to hunt bugs on it before.
Khouani described TeamViewer as a hard target and did not find any vulnerabilities within our user permission system.
To complement traditional penetration testing, TeamViewer launched its bug bounty program in 2021. Starting privately, it has evolved into a multi-tiered initiative that now plays a central role in the company’s security strategy and supports proactive vulnerability management and responsible disclosure.
Looking ahead, TeamViewer will introduce a new bug bounty program for TeamViewer DEX and expand its public and private programs. As the technical landscape continues to evolve, bug bounty initiatives help mitigate emerging vulnerabilities and complement traditional testing methods. These efforts aim to further strengthen product resilience and deepen collaboration with the security community.