{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-23571","assignerOrgId":"13430f76-86eb-43b2-a71c-82c956ef31b6","state":"PUBLISHED","assignerShortName":"TV","dateReserved":"2026-01-14T13:54:40.322Z","datePublished":"2026-01-29T08:41:45.941Z","dateUpdated":"2026-01-29T16:53:17.959Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["1E-Nomad-RunPkgStatusRequest Instruction"],"product":"DEX","vendor":"TeamViewer","versions":[{"lessThanOrEqual":"20","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Lockheed Martin Red Team"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field.&nbsp;Users of 1E Client version 24.5 or higher are not affected."}],"value":"A command injection vulnerability was discovered in TeamViewer DEX (former 1E DEX), specifically within the 1E-Nomad-RunPkgStatusRequest instruction. Improper input validation allows authenticated attackers with actioner privilege to run elevated arbitrary commands on connected hosts via malicious commands injected into the instruction’s input field. Users of 1E Client version 24.5 or higher are not affected."}],"impacts":[{"capecId":"CAPEC-248","descriptions":[{"lang":"en","value":"CAPEC-248 Command Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"13430f76-86eb-43b2-a71c-82c956ef31b6","shortName":"TV","dateUpdated":"2026-01-29T08:41:45.941Z"},"references":[{"url":"https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1002/"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Update the TeamViewer DEX Client (1E Client) to the latest available version.&nbsp;Remove the instruction 1E-Nomad-RunPkgStatusRequest from DEX Portal."}],"value":"Update the TeamViewer DEX Client (1E Client) to the latest available version. Remove the instruction 1E-Nomad-RunPkgStatusRequest from DEX Portal."}],"source":{"discovery":"UNKNOWN"},"title":"Command Injection in 1E-Nomad-RunPkgStatusRequest Instruction in TeamViewer DEX","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-29T15:57:13.887818Z","id":"CVE-2026-23571","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-29T16:53:17.959Z"}}]}}