Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.TEAMVIEWER_13_2_5287.NASL
HistoryApr 17, 2020 - 12:00 a.m.

TeamViewer Exposure of Sensitive Information

2020-04-1700:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
52

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

70.9%

The version of TeamViewer installed on the remote Windows host upto 13.1.1548 stores a password in Unicode format within TeamViewer.exe process memory between ‘[00 88]’ and ‘[00 00 00]’ delimiters, which might make it easier for attackers to obtain sensitive information by leveraging an unattended workstation on which TeamViewer has disconnected but remains running.

#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(135706);
  script_version("1.3");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/15");

  script_cve_id("CVE-2018-14333");

  script_name(english:"TeamViewer Exposure of Sensitive Information");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host is missing a security-related update.");
  script_set_attribute(attribute:"description", value:
"The version of TeamViewer installed on the remote Windows host upto 13.1.1548 stores a password 
in Unicode format within TeamViewer.exe process memory between '[00 88]' and '[00 00 00]' delimiters, 
which might make it easier for attackers to obtain sensitive information by leveraging an unattended 
workstation on which TeamViewer has disconnected but remains running.");
  # https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14333
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a6eebda9");
  # https://community.teamviewer.com/t5/Change-Logs/Windows-v13-2-5287-Full-Change-Log/m-p/39009#M12
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?a695b8b0");
  script_set_attribute(attribute:"solution", value:
"Upgrade for Teamviewer 13, upgrade to 13.2.5287 or later. Alternatively, apply the workarounds outlined in the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2018-14333");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_cwe_id(200);

  script_set_attribute(attribute:"vuln_publication_date", value:"2018/07/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2018/07/24");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/17");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:teamviewer:teamviewer");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("teamviewer_detect.nasl");
  script_require_keys("SMB/TeamViewer/Installed", "installed_sw/TeamViewer/");

  exit(0);
}

include('vcf.inc');

app_info = vcf::get_app_info(app:'TeamViewer');

constraints = [{'min_version': '13.0.0', 'max_version': '13.1.1548', 'fixed_version' : '13.2.5287'}];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);
VendorProductVersionCPE
teamviewerteamviewercpe:/a:teamviewer:teamviewer

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8 High

AI Score

Confidence

High

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

70.9%

Related for TEAMVIEWER_13_2_5287.NASL