First published: Tue Jul 17 2018(Updated: )
TeamViewer through 13.1.1548 stores a password in Unicode format within TeamViewer.exe process memory between "[00 88] and "[00 00 00]" delimiters, which might make it easier for attackers to obtain sensitive information by leveraging an unattended workstation on which TeamViewer has disconnected but remains running.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Teamviewer Teamviewer | <=13.1.1548 | |
VISAM VBASE Pro-RT/ Server-RT (Web Remote) | =11.6.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14333 is a vulnerability in TeamViewer versions up to 13.1.1548 that stores a password in Unicode format within the TeamViewer.exe process memory, making it easier for attackers to obtain sensitive information.
CVE-2018-14333 allows attackers to obtain sensitive information, such as passwords, by leveraging an unattended workstation where TeamViewer has disconnected.
The severity of CVE-2018-14333 is high, with a CVSS score of 8.1.
To fix CVE-2018-14333, users should update their TeamViewer software to a version higher than 13.1.1548.
You can find more information about CVE-2018-14333 on the GitHub page: https://github.com/vah13/extractTVpasswords