Severe TeamViewer Vulnerability Let Attackers Steal System Password

A security researcher found a severe TeamViewer vulnerability affecting Windows versions of the application 8 through 15, allowing attackers to steal system credentials.

TeamViewer is a powerful tool for remote administration, but that also means it’s already a prime target for hackers and other bad actors. Vulnerabilities in TeamViewer are dangerous, and developers have to fix them as quickly as possible.

TeamViewer recently issued a patch covering this severe vulnerability (CVE 2020-13699) as the problem affected a vast array of versions, including many still in operation. When exploited, the vulnerability lets an attacker steal the system password, making it trivial to further compromise the operating system.

“TeamViewer Desktop for Windows before 15.8.3 does not properly quote its custom URI handlers. A malicious website could launch TeamViewer with arbitrary parameters, as demonstrated by a teamviewer10: –play URL,” says the CVE advisory. “An attacker could force a victim to send an NTLM authentication request and either relay the request or capture the hash for offline password cracking.”

Bad actors could set up a phishing site with a malicious iframe, which would launch the TeamViewer client when the victim opened the website. What makes the vulnerability especially dangerous is that it would happen with little input from the user.

The developers said the vulnerability doesn’t seem to be actively used in the wild. Now that the exploit’s details are public, though, hackers will most likely make use of it. Since TeamViewer is a popular application, it will take a long time for people to upgrade their clients, allowing attackers to exploit this security issue for quite a while.

The only solution is to update TeamViewer to the latest version as soon as possible.

*** This is a Security Bloggers Network syndicated blog from HOTforSecurity authored by Silviu STAHIE. Read the original post at: