A missing validation of a user-controlled value in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to tamper with log timestamps via crafted UDP Sync command. This could result in forged or nonsensical datetime prefixes and compromising log integrity and forensic correlation.

Project Subscriptions

Vendors Products
Microsoft Subscribe
Windows Subscribe
Teamviewer Subscribe
Digital Employee Experience Subscribe
Advisories

No advisories yet.

Fixes

Solution

Update the TeamViewer DEX Client (1E Client) to the latest available version.


Workaround

No workaround given by the vendor.

History

Wed, 11 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Teamviewer digital Employee Experience
CPEs cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows
Teamviewer digital Employee Experience

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Teamviewer
Teamviewer dex
Vendors & Products Teamviewer
Teamviewer dex

Thu, 29 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description A missing validation of a user-controlled value in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to tamper with log timestamps via crafted UDP Sync command. This could result in forged or nonsensical datetime prefixes and compromising log integrity and forensic correlation.
Title Log timestamp tampering vulnerability in Content Distribution Service
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published:

Updated: 2026-01-29T15:45:56.209Z

Reserved: 2026-01-14T13:54:40.322Z

Link: CVE-2026-23570

cve-icon Vulnrichment

Updated: 2026-01-29T15:41:18.715Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T09:16:04.737

Modified: 2026-02-11T20:17:17.537

Link: CVE-2026-23570

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-30T08:43:21Z

Weaknesses