CVE-2019-18988
TeamViewer Remote vulnerability analysis and mitigation

Overview

TeamViewer Desktop through version 14.7.1965 contains a security vulnerability (CVE-2019-18988) that allows bypass of remote-login access control. The vulnerability exists because TeamViewer used the same AES key for all installations since at least version 7.0.43148, particularly for encrypting OptionsPasswordAES in the registry (CISA KEV, AttackerKB).

Technical details

The vulnerability stems from TeamViewer using a shared AES-128-CBC encryption key (0602000000a400005253413100040000) and initialization vector (0100010067244F436E6762F25EA8D704) across all installations to encrypt sensitive information stored in the Windows registry. This includes the client settings password, proxy passwords, and in older versions, the Unattended Access password (WhyNotSecurity, TeamViewer Security).

Impact

If an attacker knows the shared encryption key, they can decrypt protected information stored in the registry or configuration files. For versions before TeamViewer 9.x, this allowed attackers to decrypt the Unattended Access password, enabling remote login and headless file browsing. While newer versions changed how the Unattended Access password is stored, the vulnerability still affects other encrypted registry values (TeamViewer Security).

Mitigation and workarounds

TeamViewer's security engineers worked on improving the encryption for data points that need to be available on the local system and limiting the use of local registry keys. The company emphasized that TeamViewer account passwords are not affected as they use Secure Remote Password (SRP) for account authentication (TeamViewer Security).

Additional resources


SourceThis report was generated using AI

Related TeamViewer Remote vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-0065HIGH7.8
  • TeamViewer RemoteTeamViewer Remote
  • cpe:2.3:a:teamviewer:remote
NoYesJan 28, 2025
CVE-2024-0819HIGH7.8
  • NixOSNixOS
  • remote
NoYesFeb 27, 2024
CVE-2025-36537HIGH7
  • TeamViewer RemoteTeamViewer Remote
  • cpe:2.3:a:teamviewer:remote
NoYesJun 24, 2025
CVE-2024-2451MEDIUM6.4
  • TeamViewer RemoteTeamViewer Remote
  • cpe:2.3:a:teamviewer:remote
NoYesMay 28, 2024
CVE-2024-6053MEDIUM4.3
  • TeamViewer RemoteTeamViewer Remote
  • teamviewer
NoYesAug 28, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management