Project Subscriptions
No advisories yet.
Solution
Update the TeamViewer DEX Client (1E Client) to the latest available version.
Workaround
No workaround given by the vendor.
Wed, 11 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Teamviewer digital Employee Experience |
|
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Teamviewer digital Employee Experience |
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 29 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An out-of-bounds read vulnerability in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an attacker on the adjacent network to cause information disclosure or denial-of-service via a special crafted packet. The leaked memory could be used to bypass ASLR and facilitate further exploitation. | |
| Title | Out-of-bounds read vulnerability in Content Distribution Service | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2026-01-29T16:04:44.937Z
Reserved: 2026-01-14T13:54:40.322Z
Link: CVE-2026-23568
Updated: 2026-01-29T16:04:40.962Z
Status : Analyzed
Published: 2026-01-29T09:16:04.473
Modified: 2026-02-11T20:09:18.650
Link: CVE-2026-23568
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:43:22Z