Improper Link Resolution Before File Access (invoked by 1E‑Explorer‑TachyonCore‑DeleteFileByPath instruction) in TeamViewer DEX - 1E Client before version 26.1 on Windows allows a low‑privileged local attacker to delete protected system files via a crafted RPC control junction or symlink that is followed when the delete instruction executes.

Project Subscriptions

Vendors Products
Microsoft Subscribe
Windows Subscribe
Teamviewer Subscribe
Digital Employee Experience Subscribe
Advisories

No advisories yet.

Fixes

Solution

Update the TeamViewer DEX Client (1E Client) to the latest available version.


Workaround

No workaround given by the vendor.

History

Wed, 11 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Teamviewer digital Employee Experience
CPEs cpe:2.3:a:teamviewer:digital_employee_experience:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows
Teamviewer digital Employee Experience

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Teamviewer
Teamviewer dex
Vendors & Products Teamviewer
Teamviewer dex

Thu, 29 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description Improper Link Resolution Before File Access (invoked by 1E‑Explorer‑TachyonCore‑DeleteFileByPath instruction) in TeamViewer DEX - 1E Client before version 26.1 on Windows allows a low‑privileged local attacker to delete protected system files via a crafted RPC control junction or symlink that is followed when the delete instruction executes.
Title Privilege escalation in TeamViewer DEX via DeleteFileByPath instruction
Weaknesses CWE-59
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TV

Published:

Updated: 2026-01-29T16:53:26.845Z

Reserved: 2026-01-14T13:54:40.321Z

Link: CVE-2026-23563

cve-icon Vulnrichment

Updated: 2026-01-29T15:57:29.097Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T09:16:03.793

Modified: 2026-02-11T19:20:41.057

Link: CVE-2026-23563

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-30T08:43:52Z

Weaknesses