TeamViewer DEX Client <=25.11 Windows CI Validation Bypass (NomadBranch.exe)
CVE-2025-44016 Published on December 11, 2025
File Hash Validation Bypass in NomadBranch.exe
A vulnerability in TeamViewer DEX Client (former 1E client) - Content Distribution Service (NomadBranch.exe) prior version 25.11 for Windows allows malicious actors to bypass file integrity validation via a crafted request. By providing a valid hash for a malicious file, an attacker can cause the service to incorrectly validate and process the file as trusted, enabling arbitrary code execution under the Nomad Branch service context.
Vulnerability Analysis
Weakness Type
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Affected Versions
TeamViewer DEX:- Before 25.11.0.29 is affected.
- Before and including 25.9.0.46 is affected.
- Before and including 25.5.0.53 is affected.
- Before and including 24.5.0.69 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.