Cyber Security News

TeamViewer for Windows Vulnerability Let Attackers Escalate Privileges

TeamViewer’s Remote client software for Windows has discovered a critical security vulnerability. This vulnerability could potentially allow attackers to elevate their privileges on affected systems.

The flaw, identified as CVE-2024-7479 and CVE-2024-7481, affects multiple versions of TeamViewer’s Windows Remote full client and Remote Host products.

The vulnerability stems from improper verification of cryptographic signatures in the TeamViewer_service.exe component.

This weakness could enable an attacker with local, unprivileged access to a Windows system to Privilege Escalation and install drivers. The severity of this flaw is underscored by its high CVSS3.1 base score of 8.8.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration

Affected versions include TeamViewer Remote full client and Remote Host for Windows versions earlier than 15.58.4 and several older major versions dating back to version 11.

TeamViewer has addressed the issue in version 15.58.4 and is urging all users to update to the latest available version immediately.

Certainly. Here’s a markdown table of the affected products and versions based on the information provided:

ProductAffected Versions
TeamViewer Remote Full Client (Windows)< 15.58.4
TeamViewer Remote Full Client (Windows)< 14.7.48796
TeamViewer Remote Full Client (Windows)< 13.2.36225
TeamViewer Remote Full Client (Windows)< 12.0.259312
TeamViewer Remote Full Client (Windows)< 11.0.259311
TeamViewer Remote Host (Windows)< 15.58.4
TeamViewer Remote Host (Windows)< 14.7.48796
TeamViewer Remote Host (Windows)< 13.2.36225
TeamViewer Remote Host (Windows)< 12.0.259312
TeamViewer Remote Host (Windows)< 11.0.259311

Security researcher Peter Gabaldon, working in collaboration with Trend Micro’s Zero Day Initiative, discovered this vulnerability. TeamViewer has thanked Gabaldon for responsibly disclosing the flaw, allowing them to develop and release a patch.

Given the widespread use of TeamViewer in both corporate and personal settings, users must take immediate action. Updating to the latest version is the recommended solution to mitigate the risk posed by this vulnerability.

As remote work continues to be prevalent, ensuring the security of remote access tools remains paramount for organizations and individuals alike.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try It for Free

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands

ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…

14 hours ago

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…

14 hours ago

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…

15 hours ago

175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…

16 hours ago

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…

16 hours ago

Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life

Microsoft Defender for Endpoint is incorrectly flagging specific versions of SQL Server as having reached…

18 hours ago