First published: Wed Jul 29 2020(Updated: )
TeamViewer Desktop for Windows before 15.8.3 does not properly quote its custom URI handlers. A malicious website could launch TeamViewer with arbitrary parameters, as demonstrated by a teamviewer10: --play URL. An attacker could force a victim to send an NTLM authentication request and either relay the request or capture the hash for offline password cracking. This affects teamviewer10, teamviewer8, teamviewerapi, tvchat1, tvcontrol1, tvfiletransfer1, tvjoinv8, tvpresent1, tvsendfile1, tvsqcustomer1, tvsqsupport1, tvvideocall1, and tvvpn1. The issue is fixed in 8.0.258861, 9.0.258860, 10.0.258873, 11.0.258870, 12.0.258869, 13.2.36220, 14.2.56676, 14.7.48350, and 15.8.3.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Teamviewer Teamviewer | <15.8.3 | |
Microsoft Windows | ||
VISAM VBASE Pro-RT/ Server-RT (Web Remote) | =11.6.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13699 is a vulnerability in TeamViewer Desktop for Windows before 15.8.3 that allows a malicious website to launch TeamViewer with arbitrary parameters.
CVE-2020-13699 leverages the improper quoting of custom URI handlers in TeamViewer Desktop for Windows to execute arbitrary commands when a user visits a malicious website.
The severity of CVE-2020-13699 is rated as high with a CVSS score of 8.8.
To mitigate CVE-2020-13699, update TeamViewer Desktop for Windows to version 15.8.3 or later.
You can find more information about CVE-2020-13699 in the TeamViewer community announcement and the provided reference links.