www.belgium.be Logo of the federal government

TEAMVIEWER VULNERABILITY COULD ALLOW OFFLINE PASSWORD CRACKING

Reference: 
Advisory #2020-026
Version: 
1.0
Affected software: 
TeamViewer versions prior to 15.8.3
Type: 
Brute-Forcing
CVE/CVSS: 

CVE-2020-13699

Sources

https://community.teamviewer.com/t5/Announcements/Statement-on-CVE-2020-...
https://jeffs.sh/CVEs/CVE-2020-13699.txt
https://www.helpnetsecurity.com/2020/08/06/cve-2020-13699/
https://nvd.nist.gov/vuln/detail/CVE-2020-13699

Risks

Successful exploitation of this high-risk vulnerability could allow a remote attacker to crack users’ passwords and, consequently, lead to further system exploitation. This vulnerability impacts government entities including large, medium and small businesses.

Description

TeamViewer is an application used for remote control, desktop sharing, online meetings, web conference and file transfer between systems.

This vulnerability is due to the program not properly quoting its customer Uniformed Resources Identifier (URI) handlers and could be exploited when the system visits a malicious website. An attacker could include a malicious iframe in a website with a crafted URL that would launch the TeamViewer desktop client and force it to open a remote SMB share. Windows will then launch an NTLM authentication request to the attacker’s system allowing for offline rainbow table attacks and brute force cracking attempts.

Recommended Actions

CERT.be recommends to system administrators to update their software to the most recent version available (at least version 15.8.4).