{"id":33367,"date":"2024-02-28T01:19:49","date_gmt":"2024-02-28T00:19:49","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=33367"},"modified":"2024-02-28T01:20:48","modified_gmt":"2024-02-28T00:20:48","slug":"teamviewer-password-vulnerability-cve-2024-0819","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2024\/02\/28\/teamviewer-password-vulnerability-cve-2024-0819\/","title":{"rendered":"TeamViewer password vulnerability CVE-2024-0819"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Stop - Pixabay\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/06\/Stop01.jpg\" alt=\"Stop - Pixabay\" width=\"163\" height=\"163\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2024\/02\/28\/teamviewer-passwort-schwachstelle-cve-2024-0819\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]A short warning to readers who use the TeamViewer remote maintenance software still with a \"personal password\". The client for Windows should urgently be updated to version 15.51.5. The manufacturer has published a security notice stating that older software versions only offer incomplete protection of personal password settings. Here are the details what you need to know.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/60c1b2960bcb492da16be9d867f54394\" alt=\"\" width=\"1\" height=\"1\" \/><a href=\"https:\/\/www.teamviewer.com\/\" target=\"_blank\" rel=\"nofollow noopener\">TeamViewer<\/a> is a proprietary software for remote access, remote control and remote maintenance of computers and other end devices that was released in 2005. I came across the information via the following tweet that TeamViewer has published the security warning<a href=\"https:\/\/www.teamviewer.com\/en\/trust-center\/security-bulletins\/tv-2024-1001\/\" target=\"_blank\" rel=\"noopener\">TV-2024-1001<\/a> (<em>Incomplete protection of personal password settings<\/em>) .<\/p>\n<p><img decoding=\"async\" title=\"TeamViewer warning\" src=\"https:\/\/i.postimg.cc\/JncBZchc\/image.png\" alt=\"TeamViewer warning\" \/><\/p>\n<p>The provider TeamViewer warns of the vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-0819\" target=\"_blank\" rel=\"noopener\">CVE-2024-0819<\/a> in its remote maintenance client for Windows, Linux and macOS. By improperly initialising the default settings in the TeamViewer Remote Client prior to version 15.51.5 for Windows, Linux and macOS, a user with low privileges can increase their rights. This is possible by changing the setting for the personal password and establishing a remote connection to a logged-in admin account, according to the NIST page.<\/p>\n<p>The vendor is a little more specific and writes that a vulnerability was found in the TeamViewer client prior to version 15.51.5 that could allow an unprivileged user on a multi-user system to set a personal password.<\/p>\n<p>In the Teamviewer client prior to version 15.51.5, access to the personal password setting does not require administrator rights. A low privileged user on a multi-user system who has access to the client can set a personal password. This may allow an unprivileged user to establish a remote connection to other currently logged in users on the same system.<\/p>\n<p>The vulnerability has a CVSS 3.0 score of 7.8 (High) and affects all client versions prior to version 15.51.5 that use a personal password. The problem has been fixed with version 15.51.5..<\/p>\n<ul>\n<li>Teamviewer Remote Full Client &lt; 15.51.5 <a href=\"https:\/\/www.teamviewer.com\/en\/download\/windows\/\" target=\"_blank\" rel=\"noopener\">Update available<\/a><\/li>\n<li>Teamviewer Remote Host &lt; 15.51.5 <a href=\"https:\/\/www.teamviewer.com\/en\/download\/windows\/\" target=\"_blank\" rel=\"noopener\">Update available<\/a><\/li>\n<\/ul>\n<p>TeamViewer clients with activated setting \"Changes require administrative rights on this computer\" or additional security functions, e.g:<\/p>\n<ul>\n<li>Password options<\/li>\n<li>Conditional access<\/li>\n<li>BYOC<\/li>\n<li>Block &amp; Allow List<br \/>\nAccess control<br \/>\nTFA for connections<br \/>\nOne-time password<\/li>\n<\/ul>\n<p>that are active and correctly configured are not affected. TeamViewer recommends the use of Easy Access for unattended access. In combination with two-factor authentication, this protection covers access to the TeamViewer account and any computer that is supported via TeamViewer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A short warning to readers who use the TeamViewer remote maintenance software still with a \"personal password\". The client for Windows should urgently be updated to version 15.51.5. The manufacturer has published a security notice stating that older software versions &hellip; <a href=\"https:\/\/borncity.com\/win\/2024\/02\/28\/teamviewer-password-vulnerability-cve-2024-0819\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,1544],"class_list":["post-33367","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=33367"}],"version-history":[{"count":2,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33367\/revisions"}],"predecessor-version":[{"id":33369,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/33367\/revisions\/33369"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=33367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=33367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=33367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}