Products
TeamViewer Client (Full & Host)
- before 15.54
TeamViewer Client
- < 15.54
Source
psirt@teamviewer.com
Tags
CVE-2024-2451 details
Published : May 28, 2024, 3:15 p.m.
Last Modified : May 28, 2024, 5:11 p.m.
Last Modified : May 28, 2024, 5:11 p.m.
Description
Improper fingerprint validation in the TeamViewer Client (Full & Host) prior Version 15.54 for Windows and macOS allows an attacker with administrative user rights to further elevate privileges via executable sideloading.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6.4 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
6.4
Exploitability Score
Impact Score
Base Severity
MEDIUM
Vector String : CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
References
URL | Source |
---|---|
https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2024-1004/ | psirt@teamviewer.com |
This website uses the NVD API, but is not approved or certified by it.