CVE-2025-1683
Published: 12 March 2025
Summary
CVE-2025-1683 is a high-severity Link Following (CWE-59) vulnerability in 1E Platform. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data Destruction (T1485); ranked at the 40.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires identification, reporting, and timely correction of the improper link resolution flaw in the Nomad module, as evidenced by the vendor patch in version 25.3.
Mandates validation of file path inputs to prevent exploitation of symbolic links through improper resolution before access in the Nomad module.
Enforces least privilege for the Nomad module process, limiting the scope of arbitrary file deletions achievable via local unprivileged symlink exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables local attackers to delete arbitrary files via symbolic link exploitation (CWE-59), directly facilitating data destruction by targeting sensitive data or system files.
NVD Description
Improper link resolution before file access in the Nomad module of the 1E Client, in versions prior to 25.3, enables an attacker with local unprivileged access on a Windows system to delete arbitrary files on the device by exploiting symbolic…
more
links.
Deeper analysisAI
CVE-2025-1683 involves improper link resolution before file access in the Nomad module of the 1E Client, affecting versions prior to 25.3 on Windows systems. Published on 2025-03-12, this vulnerability (CWE-59) enables exploitation of symbolic links and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts from local attacks.
An attacker with local unprivileged access on the affected Windows device can exploit the flaw to delete arbitrary files. The low attack complexity and lack of required user interaction make it feasible for any local user account to target sensitive data or system files via crafted symbolic links during Nomad module operations.
Vendor guidance in the TeamViewer security bulletin (1e-2025-2001) and the NVD entry detail mitigation, with the issue resolved in 1E Client version 25.3 and later. Security practitioners should consult https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2025-2001/ for patching instructions, alongside CWE-59 and related CAPEC-27 resources at their respective MITRE links and https://nvd.nist.gov/vuln/detail/CVE-2025-1683.
Details
- CWE(s)