A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to bypass file integrity validation via a crafted request. By providing a valid hash for a malicious file, an attacker can cause the service to incorrectly validate and process the file as trusted, enabling arbitrary code execution under the Nomad Branch service context.
Advisories

No advisories yet.

Fixes

Solution

Update the TeamViewer DEX client to the latest available version.


Workaround

No workaround given by the vendor.

History

Thu, 15 Jan 2026 05:00:00 +0900

Type Values Removed Values Added
First Time appeared Teamviewer digital Employee Experience
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Teamviewer digital Employee Experience

Fri, 12 Dec 2025 03:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 01:30:00 +0900

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Teamviewer
Teamviewer dex
Vendors & Products Microsoft
Microsoft windows
Teamviewer
Teamviewer dex

Thu, 11 Dec 2025 20:45:00 +0900

Type Values Removed Values Added
Description A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to bypass file integrity validation via a crafted request. By providing a valid hash for a malicious file, an attacker can cause the service to incorrectly validate and process the file as trusted, enabling arbitrary code execution under the Nomad Branch service context.
Title File Hash Validation Bypass in NomadBranch.exe
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published:

Updated: 2025-12-11T17:20:33.878Z

Reserved: 2025-04-30T08:08:15.948Z

Link: CVE-2025-44016

cve-icon Vulnrichment

Updated: 2025-12-11T17:20:08.347Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-11T12:16:25.137

Modified: 2026-01-14T19:57:03.470

Link: CVE-2025-44016

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-12T01:20:01Z

Weaknesses