TeamViewer Patches High-Severity Vulnerability in Windows Applications

TeamViewer Patches High-Severity Vulnerability in Windows Applications
Summary: TeamViewer has released critical patches for a high-severity elevation of privilege vulnerability (CVE-2025-0065) affecting its remote access solutions for Windows. The security flaw, which scores 7.8 on the CVSS scale, could allow local attackers to perform argument injection and elevate their privileges. Users are strongly urged to update their applications as the vulnerability could potentially be exploited, despite no evidence of in-the-wild attacks being observed so far.

Affected: TeamViewer Full Client and TeamViewer Host (versions 11.x, 12.x, 13.x, 14.x, and 15.x)

Keypoints :

  • Vulnerability tracked as CVE-2025-0065 with a CVSS score of 7.8.
  • Exploitation requires local access to a Windows system.
  • Updates released for affected versions: 15.62, 14.7.48799, 13.2.36226, 12.0.259319, and 11.0.259318.
  • TeamViewer has no indication of the vulnerability being exploited in the wild, but recommends immediate updates.
  • Previous incidents have involved attackers using TeamViewer to deploy malware or gain unauthorized access.

Source: https://www.securityweek.com/teamviewer-patches-high-severity-vulnerability-in-windows-applications/