
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2021-34858 affects TeamViewer software and allows remote attackers to execute arbitrary code on affected installations. The vulnerability was discovered and reported to TeamViewer on April 27, 2021, and was publicly disclosed on August 26, 2021 (ZDI Advisory).
The vulnerability exists within the parsing of TVS files and stems from improper validation of user-supplied data, which can result in an out-of-bounds read past the end of an allocated structure. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. The weakness has been classified as CWE-125 (Out-of-bounds Read) (ZDI Advisory, NVD Entry).
When successfully exploited, this vulnerability allows attackers to execute arbitrary code in the context of the current process. The vulnerability affects TeamViewer versions up to (excluding) 15.21.2 (NVD Entry).
TeamViewer has released an update to address this vulnerability. Users are advised to update their TeamViewer installations to version 15.21.2 or later (TeamViewer Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."