Cyber Security News

TeamViewer for Windows Vulnerability Let Attackers Escalate Privileges

TeamViewer’s Remote client software for Windows has discovered a critical security vulnerability. This vulnerability could potentially allow attackers to elevate their privileges on affected systems.

The flaw, identified as CVE-2024-7479 and CVE-2024-7481, affects multiple versions of TeamViewer’s Windows Remote full client and Remote Host products.

The vulnerability stems from improper verification of cryptographic signatures in the TeamViewer_service.exe component.

This weakness could enable an attacker with local, unprivileged access to a Windows system to Privilege Escalation and install drivers. The severity of this flaw is underscored by its high CVSS3.1 base score of 8.8.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

Affected versions include TeamViewer Remote full client and Remote Host for Windows versions earlier than 15.58.4 and several older major versions dating back to version 11.

TeamViewer has addressed the issue in version 15.58.4 and is urging all users to update to the latest available version immediately.

Certainly. Here’s a markdown table of the affected products and versions based on the information provided:

ProductAffected Versions
TeamViewer Remote Full Client (Windows)< 15.58.4
TeamViewer Remote Full Client (Windows)< 14.7.48796
TeamViewer Remote Full Client (Windows)< 13.2.36225
TeamViewer Remote Full Client (Windows)< 12.0.259312
TeamViewer Remote Full Client (Windows)< 11.0.259311
TeamViewer Remote Host (Windows)< 15.58.4
TeamViewer Remote Host (Windows)< 14.7.48796
TeamViewer Remote Host (Windows)< 13.2.36225
TeamViewer Remote Host (Windows)< 12.0.259312
TeamViewer Remote Host (Windows)< 11.0.259311

Security researcher Peter Gabaldon, working in collaboration with Trend Micro’s Zero Day Initiative, discovered this vulnerability. TeamViewer has thanked Gabaldon for responsibly disclosing the flaw, allowing them to develop and release a patch.

Given the widespread use of TeamViewer in both corporate and personal settings, users must take immediate action. Updating to the latest version is the recommended solution to mitigate the risk posed by this vulnerability.

As remote work continues to be prevalent, ensuring the security of remote access tools remains paramount for organizations and individuals alike.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try It for Free

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Threat Actors Actively Using Open-Source C2 Framework to Deliver Malicious Payloads

A new wave of cyber threats is emerging as criminals increasingly weaponize AdaptixC2, a free…

2 hours ago

Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability

Chinese-affiliated threat actor UNC6384 has been actively leveraging a critical Windows shortcut vulnerability to target…

3 hours ago

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access

Threat actors operating under the control of North Korea's regime have demonstrated continued technical sophistication…

3 hours ago

Threat Actors Using Multilingual ZIP File to Attack Financial and Government Organizations

Sophisticated threat actors have orchestrated a coordinated multilingual phishing campaign targeting financial and government organizations…

4 hours ago

AzureHound Penetration Testing Tool Weaponized by Threat Actors to Enumerate Azure and Entra ID

AzureHound, an open-source data collection tool designed for legitimate penetration testing and security research, has…

4 hours ago

CISA Warns of XWiki Platform Injection vulnerability Exploited to Execute Remote Code

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a…

4 hours ago