Improper access control in the TeamViewer Full and Host clients (Windows, macOS, Linux) prior version 15.74.5 allows an authenticated user to bypass additional access controls with “Allow after confirmation” configuration in a remote session. An exploit could result in unauthorized access prior to local confirmation. The user needs to be authenticated for the remote session via ID/password, Session Link, or Easy Access as a prerequisite to exploit this vulnerability.
History

Thu, 05 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
Description Improper access control in the TeamViewer Full and Host clients (Windows, macOS, Linux) prior version 15.74.5 allows an authenticated user to bypass additional access controls with “Allow after confirmation” configuration in a remote session. An exploit could result in unauthorized access prior to local confirmation. The user needs to be authenticated for the remote session via ID/password, Session Link, or Easy Access as a prerequisite to exploit this vulnerability.
Title Improper Access Control in TeamViewer clients
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published:

Updated: 2026-02-05T11:51:20.224Z

Reserved: 2026-01-14T13:54:40.322Z

Link: CVE-2026-23572

cve-icon Vulnrichment

Updated: 2026-02-05T14:11:00.715Z

cve-icon NVD

Status : Received

Published: 2026-02-05T12:16:01.607

Modified: 2026-02-05T12:16:01.607

Link: CVE-2026-23572

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.