Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
TeamViewer Password Storage 'teamviewer.exe' Information Disclosure Vulnerability (Windows)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The host is installed with TeamViewer Premium is prone to information disclosure vulnerability.
Insight
Insight
The flaw is due to TeamViewer stores a password in Unicode format within TeamViewer.exe process memory between '[00 88]' and '[00 00 00]' delimiters, which allows attackers to obtain sensitive information by leveraging an unattended workstation on which TeamViewer has disconnected but remains running.
Affected Software
Affected Software
TeamViewer versions through 13.1.1548 on Windows.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
As a workaround disable the underlying feature by unchecking the checkbox Temporarily save connection passwords via the path Extras -> Options -> Advanced -> Advanced settings for connections to other computers.