Improper access control in the TeamViewer Full and Host clients (Windows, macOS, Linux) prior version 15.74.5 allows an authenticated user to bypass additional access controls with “Allow after confirmation” configuration in a remote session. An exploit could result in unauthorized access prior to local confirmation. The user needs to be authenticated for the remote session via ID/password, Session Link, or Easy Access as a prerequisite to exploit this vulnerability.
Advisories

No advisories yet.

Fixes

Solution

Update to the latest client version (15.74.5 or the latest version available).


Workaround

If an immediate update of the client is not possible and the use of additional access controls is required, the access control setting “Control this computer – Allow after Confirmation” can be set as mitigation. This prevents exploitation. The access controls can be configured in the Client Settings – “Advanced Options > Advanced Settings for connections to this computer” or via Policies “Access Control (incoming connections)”.

History

Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Teamviewer
Teamviewer full Client
Teamviewer host
Teamviewer teamviewer
Vendors & Products Teamviewer
Teamviewer full Client
Teamviewer host
Teamviewer teamviewer

Thu, 05 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
Description Improper access control in the TeamViewer Full and Host clients (Windows, macOS, Linux) prior version 15.74.5 allows an authenticated user to bypass additional access controls with “Allow after confirmation” configuration in a remote session. An exploit could result in unauthorized access prior to local confirmation. The user needs to be authenticated for the remote session via ID/password, Session Link, or Easy Access as a prerequisite to exploit this vulnerability.
Title Improper Access Control in TeamViewer clients
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published:

Updated: 2026-02-05T14:11:05.910Z

Reserved: 2026-01-14T13:54:40.322Z

Link: CVE-2026-23572

cve-icon Vulnrichment

Updated: 2026-02-05T14:11:00.715Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-05T12:16:01.607

Modified: 2026-02-05T14:57:20.563

Link: CVE-2026-23572

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-06T12:05:38Z

Weaknesses