{"uuid": "87a137ce-51e2-43d5-b802-56d32d254646", "vulnerability": {"vulnId": "CVE-2019-18988", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "87a137ce-51e2-43d5-b802-56d32d254646"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: TeamViewer Desktop Bypass Remote Login Vulnerability | Affected: TeamViewer / Desktop | Description: TeamViewer Desktop allows for bypass of remote-login access control because the same AES key is used for different customers' installations. If an attacker were to know this key, they could decrypt protected information stored in registry or configuration files or decryption of the Unattended Access password to the system (which allows for remote login to the system). | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2019-18988"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-521"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Desktop", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "TeamViewer", "vulnerabilityName": "TeamViewer Desktop Bypass Remote Login Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2019-18988", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2019-18988"}]}
