Vigil@nce - TeamViewer: information disclosure via Constant Key AES Encrypted Password
February 2020 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer-vulnerabilities-watch-and-alert
SYNTHESIS OF THE VULNERABILITY
Impacted products: TeamViewer.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Confidence: confirmed by the editor (5/5).
Creation date: 05/02/2020.
Revision date: 06/02/2020.
DESCRIPTION OF THE VULNERABILITY
An attacker can bypass access restrictions to data via Constant
Key AES Encrypted Password of TeamViewer, in order to obtain
sensitive information.
ACCESS TO THE FULL VIGIL@NCE BULLETIN