Project Subscriptions
No advisories yet.
Solution
Update the TeamViewer DEX Client (1E Client) to the latest available version.
Workaround
No workaround given by the vendor.
Wed, 11 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Teamviewer digital Employee Experience |
|
| CPEs | cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows Teamviewer digital Employee Experience |
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Teamviewer
Teamviewer dex |
|
| Vendors & Products |
Teamviewer
Teamviewer dex |
Thu, 29 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A missing validation of a user-controlled value in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows an adjacent network attacker to tamper with log timestamps via crafted UDP Sync command. This could result in forged or nonsensical datetime prefixes and compromising log integrity and forensic correlation. | |
| Title | Log timestamp tampering vulnerability in Content Distribution Service | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TV
Published:
Updated: 2026-01-29T15:45:56.209Z
Reserved: 2026-01-14T13:54:40.322Z
Link: CVE-2026-23570
Updated: 2026-01-29T15:41:18.715Z
Status : Analyzed
Published: 2026-01-29T09:16:04.737
Modified: 2026-02-11T20:17:17.537
Link: CVE-2026-23570
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:43:21Z