{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-64995","assignerOrgId":"13430f76-86eb-43b2-a71c-82c956ef31b6","state":"PUBLISHED","assignerShortName":"TV","dateReserved":"2025-11-12T08:16:25.593Z","datePublished":"2025-12-11T11:29:50.467Z","dateUpdated":"2025-12-11T14:40:43.196Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction"],"product":"DEX","vendor":"TeamViewer","versions":[{"lessThan":"3.4","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Lockheed Martin Red Team"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction prior V3.4. Improper protection of the execution path on the local device allows attackers, with local access to the device during execution, to hijack the process and execute arbitrary code with SYSTEM privileges.<p></p>"}],"value":"A privilege escalation vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction prior V3.4. Improper protection of the execution path on the local device allows attackers, with local access to the device during execution, to hijack the process and execute arbitrary code with SYSTEM privileges."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-427","description":"CWE-427 Uncontrolled Search Path Element","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"13430f76-86eb-43b2-a71c-82c956ef31b6","shortName":"TV","dateUpdated":"2025-12-11T11:29:50.467Z"},"references":[{"url":"https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1006/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Update to the latest available versions (v3.4 or later)."}],"value":"Update to the latest available versions (v3.4 or later)."}],"source":{"discovery":"EXTERNAL"},"title":"Privilege Escalation via Process Hijacking in 1E-Exchange-NomadClientHealth-ConfigureGeneralSetting instruction","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-11T14:37:06.691098Z","id":"CVE-2025-64995","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-11T14:40:43.196Z"}}]}}