Security patch: Attackers can delete Windows files via TeamViewer vulnerability

The developers have closed a vulnerability in the current version of the remote access client TeamViewer for Windows.

listen Print view

(Image: Photon photo/Shutterstock.com)

1 min. read

A security vulnerability in a component of the Windows version of the TeamViewer client puts PCs at risk. The developers assure us that the security update will be installed automatically.

Based on a warning message, the TeamViewer Patch & Asset Management component is vulnerable (CVE-2024-12363"high"). However, the component is not installed by default. It can be optionally installed in the context of the remote management feature. If this is not used, PCs are not vulnerable.

The developers state that they have repaired the component in issue 24.12. This security patch should install automatically so that users do not have to do anything.

Videos by heise

Prior to this version, local attackers were able to exploit the vulnerability and delete any files under Windows. How this works in detail and whether there have already been attacks is not yet known.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.