TeamViewer steal users’ password

 

TeamViewer port could be exploited to steal users’ password
TeamViewer has a high-risk vulnerability (CVE-2020-13699) could be exploited by remote attackers to steal users’ password, and could lead to further system exploitation.

What's TeamViewer?



TeamViewer is an application and is available for Windows, macOS, Linux, Chrome OS, iOS, Android, Windows RT Windows Phone 8 and BlackBerry operating systems, this application used primarily for remote access to control of various types of computer systems and mobile devices, but also offers many features.

Organizations have recently increased use of this program according to COVID-19 precautions, as many employees are forced to work from home.

What's vulnerability (CVE-2020-13699)?

CVE-2020-13699 is a security bug arising from an unquoted search path or element and could be exploited when the system with a vulnerable version of TeamViewer installed visits a maliciously crafted website.

This allow attacker embed a malicious in URL that would launch the TeamViewer Windows desktop client and force it to open a remote SMB share.

Windows will perform NTLM authentication when opening the SMB share and that request can be relayed.

According to the company, the vulnerability affects TeamViewer versions 8 through 15 (up to 15.8.2) for the Windows platform. Users are advised to upgrade to version 15.8.3 to close the hole.

So, we need to ask ourselves is TeamViewer safe for Remote connection ... and what happened can be classified as a real bug, or something else .... it's discovered with COVID19 and before that what was attackers doing in their hidden world?

you can watch our content about teamviewer

Comments

Popular posts from this blog

TIKTOK Free Crypto Promo Code Scam Explained

Reason Cybersecurity rsenginesvc exe Uninstall Guide