Teamviewer has issued an emergency patch for a critical vulnerability that allowed users sharing a desktop session to gain complete control of the other's system without any permission or alert.
TeamViewer is a software used to connect and view/control desktops remotely. Users can securely share their desktop or take full control of other's system over the Internet from anywhere in the world if given the permission.
The vulnerability was first discovered on Monday by a Reddit user “xpl0yt” who linked a POC(Proof-of-Concept) code(an injectable C++ DLL) which leverages the bug to change TeamViewer permissions.
The POC was uploaded to GitHub by a user named "Gellin". The POC leverages "naked inline hooking and direct memory modification to change TeamViewer permissions." The vulnerability can be exploited from both servers as well as client sides.
From server side - the vulnerability can be exploited to enable “switch sides” feature which an attacker can use to take control of victim’s PC during a desktop session. By default, the “switch sides” feature should only be made possible when a user grants that permission manually.
From client side - the users can take control of the mouse and keyboard, without getting any authorisation control settings permissions from the server.
The vulnerability affects TeamViewer on macOS, Linux, and Windows systems. TeamViewer confirmed the existence of the bug on Monday and issued a patch for Windows users on Tuesday.