Security bulletins

TeamViewer’s security bulletins keep you up-to-date with the latest security news and advisories related to our software.

Report a security issue

TeamViewer’s security team will investigate every submission in our Vulnerability Disclosure Program.

Understand our security bulletins

For reference, TeamViewer ranks security bulletins with priority levels from low to critical.

Subscribe to updates

Stay up-to-date and receive all TeamViewer security bulletins directly via email.

Security bulletins

Bulletin ID Date Published Assigned CVE Title CVSS Priority Affected Products Last Update
1E-2025-2001 12 мар. 2025 г. CVE-2025-1683 Symbolic link exploit in 1E client 7.8 (High) Important
  • 1E Client – Nomad Module
  • 1E Content Distribution Tools v25.1
13 мар. 2025 г.
TV-2025-1001 28 янв. 2025 г. CVE-2025-0065 Improper Neutralization of Argument Delimiters in TeamViewer Clients 7.8 (High) Important
  • TeamViewer Remote
  • TeamViewer Tensor
28 янв. 2025 г.
TV-2024-1008 11 дек. 2024 г. CVE-2024-12363 Insufficient permissions in the “TeamViewer Patch & Asset Management” component. 7.1 (High) Important
  • TeamViewer Remote Management: Patch Management (Windows)
11 дек. 2024 г.
TV-2024-1006 25 сент. 2024 г. CVE-2024-7479, CVE-2024-7481 Improper signature verification of driver installation in TeamViewer Remote clients 8.8 (High) Important
  • TeamViewer Remote
  • TeamViewer Tensor
25 сент. 2024 г.
TV-2024-1007 27 авг. 2024 г. CVE-2024-6053 Improper access control in the clipboard synchronization feature in TeamViewer Remote full client and TeamViewer Meeting 4.3 (Medium) Moderate
  • TeamViewer Meeting
  • TeamViewer full client
27 авг. 2024 г.
1E-2024-2001 31 июл. 2024 г. CVE-2024-7211 1E platform URL redirection 4.7 (Medium) Moderate
  • 1E Platform
2 авг. 2024 г.
TV-2024-1005 27 июн. 2024 г. TeamViewer IT security update Informative
  • No product, platform, or customer data affected
4 июл. 2024 г.
TV-2024-1004 28 мая 2024 г. CVE-2024-2451 Improper fingerprint validation in TeamViewer client prior Version 15.54 6.4 (medium) Moderate
  • TeamViewer Remote full client
  • TeamViewer Remote Host
28 мая 2024 г.
TV-2024-1003 10 апр. 2024 г. CVE-2024-3094 XZ Utils backdoor – TeamViewer services are not affected Informative 10 апр. 2024 г.
TV-2024-1002 26 мар. 2024 г. CVE-2024-1933 Improper symlink resolution in TeamViewer Remote client for macOS 7.1 (high) Moderate
  • TeamViewer Remote client
26 мар. 2024 г.
TV-2024-1001 27 февр. 2024 г. CVE-2024-0819 Incomplete protection of personal password settings 7.3 (high) Important
  • TeamViewer Remote full client
  • TeamViewer Remote Host
27 февр. 2024 г.
1E-2023-2003 6 нояб. 2023 г. CVE-2023-45161 Improper input validation in 1E network product pack 9.9 (Critical) Critical
  • 1E Platform – Exchange Product Pack – Network
21 нояб. 2023 г.
1E-2023-2005 6 нояб. 2023 г. CVE-2023-45163 Improper input validation in 1E platform network product pack 9.9 (Critical) Critical
  • 1E Platform – Exchange Product Pack – Network
21 нояб. 2023 г.
1E-2023-2006 6 нояб. 2023 г. CVE-2023-5964 Improper Input validation in the end-user interaction product pack available on the 1E exchange 9.9 (Critical) Critical
  • 1E Platform – Exchange Product Pack – End-User Interaction
21 нояб. 2023 г.
TV-2023-1003 20 окт. 2023 г. Libwebp vulnerabilities CVE-2023-4863 and CVE-2023-41064 Important
  • TeamViewer Frontline
20 окт. 2023 г.
1E-2023-2004 13 окт. 2023 г. CVE-2023-45162 Improper neutralization of special elements in 1E platform 9.9 (Critical) Critical
  • 1E Platform
19 окт. 2023 г.
TV-2023-1002 11 окт. 2023 г. CVE-2023-38545 Hotfix for curl and libcurl vulnerability Important
  • TeamViewer Remote
  • TeamViewer Tensor
  • TeamViewer Frontline
  • TeamViewer Remote Management
11 окт. 2023 г.
1E-2023-2001 5 окт. 2023 г. CVE-2023-45159 Improper link resolution in 1E client 8.4 (High) Important
  • 1E Client for Windows
19 окт. 2023 г.
1E-2023-2002 5 окт. 2023 г. CVE-2023-45160 Insecure file handling in 1E client for windows 8.8 (High) Important
  • 1E Client for Windows
2 нояб. 2023 г.
TV-2023-1001 14 июн. 2023 г. CVE-2023-0837 Incomplete protection of local device settings 6.6 (medium) Moderate
  • TeamViewer Remote for Windows
  • TeamViewer Remote for macOS
14 июн. 2023 г.
TV-2022-1001 14 июн. 2023 г. CVE-2022-23242 TeamViewer Linux – Deletion command not properly executed after process crash 6.3 (medium) Moderate
  • TeamViewer for Linux
14 июн. 2023 г.
TV-2022-1002 22 мар. 2022 г. CVE-2022-0778 Updates for OpenSSL vulnerabilities Moderate
  • TeamViewer Windows Host IoT
  • TeamViewer IoT Agent for Linux
  • TeamViewer for Linux
  • TeamViewer Android Apps
10 янв. 2024 г.
TV-2021-1002 13 дек. 2021 г. Server-side hotfix for log4J issue Low
  • TeamViewer IoT
  • TeamViewer Engage
  • TeamViewer Frontline
29 дек. 2021 г.
TV-2021-1001 19 окт. 2021 г. Welcome to the TeamViewer Security Bulletins Informative 24 окт. 2023 г.
1E-2020-2001 29 дек. 2020 г. CVE-2020-27645 Unquoted search path in 1E client 8.8 (High) Important
  • 1E Client for Windows
21 нояб. 2024 г.
1E-2020-2002 29 дек. 2020 г. CVE-2020-27644 1E client enables privilege escalation 8.8 (High) Important
  • 1E Client for Windows
29 дек. 2020 г.
1E-2020-2003 29 дек. 2020 г. CVE-2020-27643 Improper link resolution in 1E client 6.5 (Medium) Moderate
  • 1E Client for Windows
29 дек. 2020 г.
1E-2020-2004 29 дек. 2020 г. CVE-2020-16268 Privilege escalation in 1E client 8.8 (High) Important
  • 1E Client for Windows
29 дек. 2020 г.

Security bulletin priority rating

  • Critical • Red

    A critical priority is assigned to a problem that touches a core function of TeamViewer’s software or services, and that could have a critical impact on your security posture (such as a RCE vulnerability “in the wild”). We recommend following our communication closely and implementing all advised measures. This will likely include an immediate update of the TeamViewer client.

  • Important • Orange

    An important priority is assigned to a problem of TeamViewer’s software or services that could significantly impair your security posture (such as a privilege escalation vulnerability easy to reproduce). We recommend implementing all advised measures. This will likely include an immediate update of the TeamViewer client.

  • Moderate • Yellow

    A moderate priority is assigned to a problem of TeamViewer’s software or services that could impair your local security posture only under specific circumstances. We recommend implementing all advised measures. This will likely include an update of the TeamViewer client at the earliest convenience.

  • Low • Green

    A low priority is assigned to a problem that is unlikely to be reproduced and requires privileged local access to be exploited. We recommend implementing all advised measures. This will likely include an update of the TeamViewer client during the next update cycle. The low priority category also includes general security-related announcements by TeamViewer.

Hall of Fame

2024

Lukas Radermacher

Cybersecurity Student

Nils Hanff

Cybersecurity Student

Aaron Schlitt

Cybersecurity Student

2023

2022

Mathias Maidana

Security Researcher

2021

Daniel Szameitat

Member of E.ON Pentesting Team

Do you want to report a security issue?

TeamViewer’s security team will investigate every submission in our Vulnerability Disclosure Program (VDP).