
Cloud Vulnerability DB
A community-led vulnerabilities database
A remote code execution vulnerability (CVE-2021-34859) was discovered in TeamViewer version 15.16.8.0. The vulnerability was reported on April 27, 2021, and publicly disclosed on August 26, 2021. This security flaw affects TeamViewer installations and requires user interaction for exploitation, such as visiting a malicious page or opening a malicious file (Zero Day Initiative).
The vulnerability exists within the parsing of TVS files and stems from improper validation of user-supplied data, which can result in a memory corruption condition. The vulnerability has been assigned a CVSS score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Specifically, the flaw involves a problem in shared memory management that could cause the TeamViewer service to perform an out-of-bounds read (Zero Day Initiative, TeamViewer Community).
If successfully exploited, this vulnerability allows attackers to execute arbitrary code in the context of the current process. The vulnerability could potentially lead to memory disclosure from the service process, which could be leveraged as part of a larger exploit to execute arbitrary code within the TeamViewer service running as SYSTEM (TeamViewer Community).
TeamViewer addressed this vulnerability by releasing security updates for TeamViewer 15 across Windows, Linux, and macOS platforms. The fix was implemented in version 15.21.2, released on August 24, 2021 (TeamViewer Community).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."