Cyber Posture

CVE-2026-23569

Medium

Published: 29 January 2026

Published
29 January 2026
Modified
11 February 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0005 16.9th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-23569 is a medium-severity Out-of-bounds Read (CWE-125) vulnerability in Teamviewer Digital Employee Experience. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 16.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 3 other techniques.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1082 System Information Discovery Discovery
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Out-of-bounds read enables remote stack memory disclosure (T1005/T1082) from the NomadBranch service and DoS via crafted requests (T1499.004); ASLR bypass directly facilitates remote service exploitation (T1210) and follow-on attacks.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

An out-of-bounds read vulnerability in the TeamViewer DEX Client (former 1E Client) - Content Distribution Service (NomadBranch.exe) prior version 26.1 for Windows allows a remote attacker to leak stack memory and cause a denial of service via a crafted request.…

more

The leaked stack memory could be used to bypass ASLR remotely and facilitate exploitation of other vulnerabilities on the affected system.

Deeper analysisAI

CVE-2026-23569 is an out-of-bounds read vulnerability (CWE-125) affecting the TeamViewer DEX Client, formerly known as the 1E Client, specifically in its Content Distribution Service component (NomadBranch.exe) for Windows in versions prior to 26.1. Published on 2026-01-29, the flaw has a CVSS v3.1 base score of 6.5 (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). It allows a remote attacker to leak stack memory and induce a denial of service via a crafted request, with the leaked memory potentially usable to bypass Address Space Layout Randomization (ASLR) remotely and enable exploitation of other vulnerabilities on the system.

An attacker on an adjacent network can exploit this vulnerability without privileges or user interaction, requiring only low complexity to send a malicious request to the vulnerable NomadBranch.exe process. This results in stack memory disclosure, providing insights into the memory layout that could defeat ASLR protections, alongside a denial of service that disrupts service availability.

The TeamViewer security bulletin at https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2026-1001/ provides further details on mitigation and patches for this issue.

Details

CWE(s)

Affected Products

teamviewer
digital employee experience
≤ 26.1

CVEs Like This One

CVE-2026-23568Same product: Microsoft Windows
CVE-2025-44016Same product: Microsoft Windows
CVE-2026-23563Same product: Microsoft Windows
CVE-2026-27294Same product: Microsoft Windows
CVE-2026-33096Same vendor: Microsoft
CVE-2025-24991Same vendor: Microsoft
CVE-2026-26127Same product: Microsoft Windows
CVE-2026-25181Same vendor: Microsoft
CVE-2026-21322Same product: Microsoft Windows
CVE-2026-27269Same product: Microsoft Windows

References