Security patch: Attackers can delete Windows files via TeamViewer vulnerability
The developers have closed a vulnerability in the current version of the remote access client TeamViewer for Windows.
(Image: Photon photo/Shutterstock.com)
A security vulnerability in a component of the Windows version of the TeamViewer client puts PCs at risk. The developers assure us that the security update will be installed automatically.
Operating system at risk
Based on a warning message, the TeamViewer Patch & Asset Management component is vulnerable (CVE-2024-12363"high"). However, the component is not installed by default. It can be optionally installed in the context of the remote management feature. If this is not used, PCs are not vulnerable.
The developers state that they have repaired the component in issue 24.12. This security patch should install automatically so that users do not have to do anything.
Videos by heise
Prior to this version, local attackers were able to exploit the vulnerability and delete any files under Windows. How this works in detail and whether there have already been attacks is not yet known.
(des)