
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability (CVE-2024-6053) was discovered in TeamViewer's clipboard synchronization feature affecting TeamViewer Full Client prior to version 15.57 and TeamViewer Meeting prior to version 15.55.3. The vulnerability was disclosed on August 27, 2024, and impacts multiple platforms including Windows, macOS, Linux, Android, and iOS versions of the software (Vendor Advisory).
The vulnerability has been assigned a CVSS v3.1 base score of 4.3 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N. It is classified as CWE-359: Exposure of Private Personal Information to an Unauthorized Actor. The technical issue stems from improper access control implementation in the clipboard synchronization functionality (NVD, Vendor Advisory).
The vulnerability can lead to unintentional sharing of clipboard content with the current presenter during a meeting session, potentially exposing sensitive information to unauthorized participants (Vendor Advisory).
Users are advised to update to TeamViewer Full Client version 15.57 or higher and TeamViewer Meeting version 15.55.3 or the highest available version for their platform. Specific version requirements vary by platform: Windows/macOS Meeting clients should update to 15.55.3, Android Meeting to 15.44.7, iOS Meeting to 15.57, and all Full Client versions (Windows, Linux, macOS) to 15.57.3 (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."