Vigil@nce - TeamViewer: information disclosure via Constant Key AES Encrypted Password
February 2020 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer...
SYNTHESIS OF THE VULNERABILITY
Impacted products: TeamViewer.
Consequences: data reading.
Provenance: user shell.
Confidence: confirmed by the editor (5/5).
Creation date: 05/02/2020.
Revision date: 06/02/2020.
DESCRIPTION OF THE VULNERABILITY
An attacker can bypass access restrictions to data via Constant Key AES Encrypted Password of TeamViewer, in order to obtain sensitive information.
ACCESS TO THE FULL VIGIL@NCE BULLETIN