CERT-In Vulnerability Note
CIVN-2020-0327
High-Risk Vulnerability in TeamViewer
Original Issue Date:August 21, 2020
Severity Rating: HIGH
Software Affected
- TeamViewer versions prior to 15.8.3
Overview
This Vulnerability has been reported in TeamViewer that could allow a remote attacker to launch TeamViewer with arbitrary parameters on the targeted system.
Description
This vulnerability exists in TeamViewer due to improper quote of its custom URI handlers. A remote attacker could exploit this vulnerability by sending an NTLM authentication request to the attackers system allowing for offline rainbow table attacks and brute force cracking attempts.
Successful exploitation of this vulnerability could allow the attacker to launch TeamViewer with arbitrary parameters on the targeted system.
Solution
Apply latest updates as mentioned in the vendor advisory
TeamViewer
Vendor Information
TeamViewer
https://community.teamviewer.com/t5/Announcements/Statement-on-CVE-2020-13699/td-p/98448
References
TeamViewer
https://community.teamviewer.com/t5/Announcements/Statement-on-CVE-2020-13699/td-p/98448
CIS Security
https://www.cisecurity.org/advisory/a-vulnerability-in-teamviewer-cloud-allow-for-offline-password-cracking_2020-106/
https://jeffs.sh/CVEs/CVE-2020-13699.txt
CVE Name
CVE-2020-13699
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|