FKIE_CVE-2026-23572
Vulnerability from fkie_nvd - Published: 2026-02-05 12:16 - Updated: 2026-04-15 00:35
Severity ?
Summary
Improper access control in the TeamViewer Full and Host clients (Windows, macOS, Linux) prior version 15.74.5 allows an authenticated user to bypass additional access controls with “Allow after confirmation” configuration in a remote session. An exploit could result in unauthorized access prior to local confirmation. The user needs to be authenticated for the remote session via ID/password, Session Link, or Easy Access as a prerequisite to exploit this vulnerability.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in\u202fthe\u202fTeamViewer\u202fFull and Host clients\u202f(Windows,\u202fmacOS, Linux)\u202fprior\u202fversion\u202f15.74.5 allows an authenticated user\u202fto bypass\u202fadditional\u202faccess controls with\u202f\u201cAllow after\u202fconfirmation\u201d\u202fconfiguration\u202fin\u202fa\u202fremote session.\u202fAn exploit could result in unauthorized access prior to local confirmation.\u202fThe user needs to be authenticated for the remote session via ID/password, Session Link, or Easy Access as a prerequisite to exploit this vulnerability."
},
{
"lang": "es",
"value": "Control de acceso inadecuado en los clientes TeamViewer Full y Host (Windows, macOS, Linux) anterior a la versi\u00f3n 15.74.5 permite a un usuario autenticado eludir controles de acceso adicionales con la configuraci\u00f3n \u0027Permitir despu\u00e9s de la confirmaci\u00f3n\u0027 en una sesi\u00f3n remota. Un exploit podr\u00eda resultar en acceso no autorizado antes de la confirmaci\u00f3n local. El usuario debe estar autenticado para la sesi\u00f3n remota a trav\u00e9s de ID/contrase\u00f1a, Enlace de Sesi\u00f3n o Acceso F\u00e1cil como requisito previo para explotar esta vulnerabilidad."
}
],
"id": "CVE-2026-23572",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "psirt@teamviewer.com",
"type": "Secondary"
}
]
},
"published": "2026-02-05T12:16:01.607",
"references": [
{
"source": "psirt@teamviewer.com",
"url": "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1003/"
}
],
"sourceIdentifier": "psirt@teamviewer.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-863"
}
],
"source": "psirt@teamviewer.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…