
Critical Windows Flaw in TeamViewer Remote Management Exposes SYSTEM-Level File Deletion Risk
A newly disclosed flaw in TeamViewer's Remote Management tools for Windows allows attackers with local, unprivileged access to delete files with SYSTEM-level privileges, raising serious security concerns for organisations relying on the platform. Tracked as CVE‑2025‑36537, the vulnerability stems from incorrect permissions during MSI rollback operations and affects installations prior to version 15.67. TeamViewer issued a patch on 24 June 2025 and urges all users with Remote Management enabled to upgrade immediately.
The vulnerability only applies to the Backup, Monitoring and Patch Management modules—standard screen-sharing configurations without these features are not exposed to the flaw. An attacker must already have local access, but can exploit the issue by triggering MSI rollback to delete arbitrary files within the SYSTEM context. That broad privilege is generally reserved for the Windows operating system itself, and misuse could facilitate full privilege escalation, data destruction, or deployment of additional malware for more sophisticated compromises.
TeamViewer assigns the vulnerability a CVSS 3.1 score of 7.0, indicating a high-severity threat. While the firm reports no in-the-wild exploitation, the gravity of SYSTEM-level file deletion leaves little room for complacency. The oversight has been attributed to improper permission assignment of critical resources within MSI rollback logic—a well-known software mechanism for restoring system states when an installation or patch fails.
ADVERTISEMENT
The issue affects all prior versions of the TeamViewer Remote Management client for Windows before 15.67, including multiple supported legacy builds, as well as the Host variant for equivalent versions. TeamViewer's vendor bulletin TV‑2025‑1002 provides full version details and upgrade instructions.
Security specialists warn that SYSTEM-level deletion grants an attacker unprecedented control. As one analyst noted, 'deleting arbitrary files as SYSTEM could disrupt monitoring services, back up data or core OS files,' potentially undermining incident response and remediation. Exploiting the MSI rollback path means standard OS protections and antivirus defences are typically bypassed, leaving only the update itself as an immediate remedy.
Remote Management remains a strategic vector, as Backup, Monitoring and Patch Management are common across IT operations, particularly in enterprise and managed service provider environments. Many organisations update legacy systems via these modules, and any oversight in patch adoption or delayed upgrade could expose systems to compromise. Even if remote desktop access is limited, the vulnerability becomes critical once an attacker gains basic user-level entry—via phishing, credential stuffing, malicious USB, or physical infiltration.
Cross-referencing authoritative vulnerability feeds and TeamViewer's own disclosure confirms no public exploitation has been observed. However, multiple industry experts caution that no news of attacks does not equate to immunity. A patch rated 7.0 by CVSS typically indicates an attacker with moderate effort could gain full control—bringing the risk to par with vulnerabilities often weaponised by ransomware groups or espionage actors.
In addition to urging patch adoption, TeamViewer emphasises the necessity of defence-in-depth. Isolating tools with SYSTEM rights, limiting local user privileges, and enforcing network segmentation can reduce attack surface even if local access is achieved prior to remedy deployment. Security-conscious organisations are also encouraged to audit patch schedules, ensuring Remote Management modules are included in regular updates, not just the baseline client.
ADVERTISEMENT
The bug comes months after another high-severity issue—CVE‑2025‑0065—affecting TeamViewer clients in argument delimitation parsing, also linked to potential privilege escalation and patched in version 15.62. In early 2024, a separate flaw in patch and asset management components similarly underscored structural weaknesses in privilege management. The pattern highlights the complexity of permission flows in large-scale remote management platforms and the importance of rigorous validation and testing for privilege boundaries.
TeamViewer credits Giuliano Sanfins of SiDi, working via the Trend Micro Zero Day Initiative, for identifying and responsibly disclosing the issue. The collaboration demonstrates the role of external researchers and bug bounty frameworks in safeguarding complex enterprise tools before exploitation occurs.
Organisations using TeamViewer's Remote Management suite should prioritise deployment of version 15.67 or later across all Windows hosts. Administrators are advised to verify versions in service and host deployments, ensure no components are skipped, and monitor vendor security bulletins for further updates.
Enhanced monitoring of log files for MSI rollback events, combined with endpoint detection systems tuned for unusual file deletion patterns, can offer interim safeguards. Those unable to immediately upgrade should consider temporarily disabling Remote Management features until patching is confirmed.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Zawya
38 minutes ago
- Zawya
Kaspersky: ChatGPT-mimicking cyberthreats surge 115% in early 2025
In 2025, nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks where malicious or unwanted software was disguised as popular online productivity tools, Kaspersky reports. Based on the unique malicious and unwanted files observed, the most common lures included Zoom and Microsoft Office, with newer AI-based services like ChatGPT and DeepSeek being increasingly exploited by attackers. Kaspersky has released threat analysis and mitigation strategies to help SMBs respond. Kaspersky analysts explored how frequently malicious and unwanted software are disguised as legitimate applications commonly used by SMBs, using a sample of 12 online productivity apps. In total, Kaspersky observed more than 4,000 unique malicious and unwanted files disguised as popular apps in 2025. With the growing popularity of AI services, cybercriminals are increasingly disguising malware as AI tools. The number of cyberthreats mimicking ChatGPT increased by 115% in the first four months of 2025 compared to the same period last year, reaching 177 unique malicious and unwanted files. Another popular AI tool, DeepSeek, accounted for 83 files. This large language model launched in 2025 immediately appeared on the list of impersonated tools. ' Interestingly, threat actors are rather picky in choosing an AI tool as bait. For example, no malicious files mimicking Perplexity were observed. The likelihood that an attacker will use a tool as a disguise for malware or other types of unwanted software directly depends on the service's popularity and hype around it. The more publicity and conversation there is around a tool, the more likely a user will come across a fake package on the internet. To be on the safe side, SMB employees – as well as regular users – should exercise caution when looking for software on the internet or coming across too-good-to-be-true subscription deals. Always check the correct spelling of the website and links in suspicious emails. In many cases these links may turn out to be phishing or a link that downloads malicious or potentially unwanted software ', says Vasily Kolesnikov, security expert at Kaspersky. Another cybercriminal tactic to look for in 2025 is the growing use of collaboration platform brands to trick users into downloading or launching malware. The number of malicious and unwanted software files disguised as Zoom increased by nearly 13% in 2025, reaching 1,652, while such names as 'Microsoft Teams' and 'Google Drive' saw increases of 100% and 12%, respectively, with 206 and 132 cases. This pattern likely reflects the normalization of remote work and geographically distributed teams, which has made these platforms integral to business operations across industries. Among the analyzed sample, the highest number of files mimicked Zoom, accounting for nearly 41% of all unique files detected. Microsoft Office applications remained frequent targets for impersonation: Outlook and PowerPoint each accounted for 16%, Excel for nearly 12%, while Word and Teams made up 9% and 5%, respectively. Share of unique files with names mimicking the popular legitimate applications in 2024 and 2025 The top threats targeting small and medium businesses in 2025 included downloaders, trojans and adware. Phishing and Spam Apart from malware threats, Kaspersky continues to observe a wide range of phishing and scam schemes targeting SMBs. Attackers aim to steal login credentials for various services — from delivery platforms to banking systems — or manipulate victims into sending them money through deceptive tactics. One example is a phishing attempt targeting Google Accounts. Attackers promise potential victims to increase sales by advertising their company on X, with the ultimate goal to steal their credentials. Beyond phishing, SMBs are flooded with spam emails. Not surprisingly, AI has also made its way into the spam folder — for example, with offers for automating various business processes. In general, Kaspersky observes phishing and spam offers crafted to reflect the typical needs of small businesses, promising attractive deals on email marketing or loans, offering services such as reputation management, content creation, or lead generation, and more. Learn more about the cyber threat landscape for SMBs on Securelist. To mitigate threats targeting businesses, their owners and employees are advised to implement the following measures: Use specialized cybersecurity solutions that provide visibility and control over cloud services (e.g., Kaspersky Next). Define access rules for corporate resources such as email accounts, shared folders, and online documents. Regularly backup important data. Establish clear guidelines for using external services. Create well-defined procedures for implementing new software with the involvement of IT and other responsible managers. About Kaspersky Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company's comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and over 200,000 corporate clients protect what matters most to them. Learn more at

Zawya
3 days ago
- Zawya
Kaspersky: ChatGPT-mimicking cyberthreats surge 115% in early 2025, Small and Medium-Sized Businesses (SMBs) increasingly targeted
In 2025, nearly 8,500 users from small and medium-sized businesses (SMBs) globally faced cyberattacks where malicious or unwanted software was disguised as popular online productivity tools, Kaspersky reports ( Based on the unique malicious and unwanted files observed, the most common lures included Zoom and Microsoft Office, with newer AI-based services like ChatGPT and DeepSeek being increasingly exploited by attackers. Kaspersky has released threat analysis and mitigation strategies to help SMBs respond. Kaspersky analysts explored how frequently malicious and unwanted software are disguised as legitimate applications commonly used by SMBs, using a sample of 12 online productivity apps. In total, Kaspersky observed more than 4,000 unique malicious and unwanted files disguised as popular apps in 2025. With the growing popularity of AI services, cybercriminals are increasingly disguising malware as AI tools. The number of cyberthreats mimicking ChatGPT increased by 115% in the first four months of 2025 compared to the same period last year, reaching 177 unique malicious and unwanted files. Another popular AI tool, DeepSeek, accounted for 83 files. This large language model launched in 2025 immediately appeared on the list of impersonated tools. 'Interestingly, threat actors are rather picky in choosing an AI tool as bait. For example, no malicious files mimicking Perplexity were observed. The likelihood that an attacker will use a tool as a disguise for malware or other types of unwanted software directly depends on the service's popularity and hype around it. The more publicity and conversation there is around a tool, the more likely a user will come across a fake package on the Internet. To be on the safe side, SMB employees – as well as regular users – should exercise caution when looking for software on the Internet or coming across too-good-to-be-true subscription deals. Always check the correct spelling of the website and links in suspicious emails. In many cases these links may turn out to be phishing or a link that downloads malicious or potentially unwanted software,' says Vasily Kolesnikov, security expert at Kaspersky. Another cybercriminal tactic to look for in 2025 is the growing use of collaboration platform brands to trick users into downloading or launching malware. The number of malicious and unwanted software files disguised as Zoom increased by nearly 13% in 2025, reaching 1,652, while such names as 'Microsoft Teams' and 'Google Drive' saw increases of 100% and 12%, respectively, with 206 and 132 cases. This pattern likely reflects the normalisation of remote work and geographically distributed teams, which has made these platforms integral to business operations across industries. Among the analysed sample, the highest number of files mimicked Zoom, accounting for nearly 41% of all unique files detected. Microsoft Office applications remained frequent targets for impersonation: Outlook and PowerPoint each accounted for 16%, Excel for nearly 12%, while Word and Teams made up 9% and 5%, respectively. The top threats targeting small and medium businesses in 2025 included downloaders, trojans and adware. Phishing and spam Apart from malware threats, Kaspersky continues to observe a wide range of phishing and scam schemes targeting SMBs. Attackers aim to steal login credentials for various services — from delivery platforms to banking systems — or manipulate victims into sending them money through deceptive tactics. One example is a phishing attempt targeting Google Accounts. Attackers promise potential victims to increase sales by advertising their company on X, with the ultimate goal being to steal their credentials. Beyond phishing, SMBs are flooded with spam emails. Not surprisingly, AI has also made its way into the spam folder — for example, with offers for automating various business processes. In general, Kaspersky observes phishing and spam offers crafted to reflect the typical needs of small businesses, promising attractive deals on email marketing or loans, offering services such as reputation management, content creation, or lead generation, and more. Learn more about the cyber threat landscape for SMBs on Securelist ( To mitigate threats targeting businesses, their owners and employees are advised to implement the following measures: Use specialised cybersecurity solutions that provide visibility and control over cloud services (e.g., Kaspersky Next ( Define access rules for corporate resources such as email accounts, shared folders, and online documents. Regularly backup important data. Establish clear guidelines for using external services. Create well-defined procedures for implementing new software with the involvement of IT and other responsible managers. Distributed by APO Group on behalf of Kaspersky. For further information please contact: Nicole Allman nicole@ Social Media: Facebook: X: YouTube: Instagram: Blog: About Kaspersky: Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company's comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and over 200,000 corporate clients protect what matters most to them. Learn more at


Arabian Post
4 days ago
- Arabian Post
Denmark Takes Bold Stand on Digital Sovereignty
Denmark's Ministry for Digital Affairs has begun replacing Microsoft Office 365 with LibreOffice and is exploring wider adoption of Linux, citing a strategic imperative to reduce dependency on foreign software providers. Caroline Stage Olsen, Minister for Digital Affairs, stated that nearly half the ministry's staff will complete the switch this summer, with full implementation scheduled by autumn. While Windows remains in use, Office products are being phased out to reinforce national autonomy over critical digital infrastructure. The move follows similar local actions in Copenhagen and Aarhus, where municipal administrations initiated transitions to open‑source solutions to avoid potential disruptions linked to political tensions with the United States. Licensing costs for Microsoft Office rose by approximately 72 per cent over the past five years in Denmark, underscoring both the financial and strategic dimensions of the shift. Denmark joins a growing European movement toward digital sovereignty. Germany's state of Schleswig‑Holstein, for instance, plans to migrate some 30,000 public‑sector PCs from Windows and Office to Linux and LibreOffice by 2026. France has promoted 'cloud de confiance' models, while the EU actively develops initiatives like Gaia‑X and France's Bleu cloud to reduce reliance on US tech firms. ADVERTISEMENT Denmark's strategy goes beyond cost cutting. Its leaders emphasise 'digital sovereignty'—the capacity to preserve operational control amid geopolitical uncertainties. The migration aims to pre-empt scenarios where a foreign vendor might withdraw services over political disagreements, as occurred when Microsoft temporarily restricted access to the ICC prosecutor's email during US sanctions. Stage Olsen pointed out the need for resilience: 'We must never make ourselves so dependent on so few that we can no longer act freely'. The migration path combines caution with contingency. LibreOffice is being embraced initially; full Windows replacement with Linux is under consideration, but will depend on technical readiness. Stage Olsen confirmed the ministry will revert to Microsoft tools if disruptions occur. This pragmatic stance aims to balance innovation with continuity. Open‑source alternatives are being deployed across various digital functions. Alongside LibreOffice, Denmark is evaluating NextCloud for secure self‑hosted email, calendar, and file‑sharing services as a replacement for Outlook and OneDrive. Such tools empower users with direct control over data without dependence on hyperscalers. Implementation challenges remain, particularly around software compatibility, user training, and migrating legacy systems such as Excel spreadsheets utilising VBA macros. LibreOffice's support for advanced mathematical and data‑driven Excel functions remains a concern for many users, especially in finance and technical fields. Experiences from previous migrations—most notably Munich's rollback—underscore the importance of careful planning and staged rollouts. Microsoft is responding to these developments by introducing its 'Sovereign Cloud' offering across Europe, promising data residency, European-only administrative access, and encryption controls fully managed by customers. These services demonstrate the growing pressure on major tech vendors to align with national digital policy frameworks. Denmark's strategy fits within a four‑year digitalisation plan that prioritises autonomy, transparency, and resilience. The shift is expected to yield cost savings on licensing over time while ensuring readiness for evolving geopolitical circumstances. It reflects a broader EU ambition to rebalance technological power and foster homegrown digital capacities. Yet the outcome remains uncertain. Technical compatibility and user adoption will determine whether this effort succeeds or stalls. If Denmark navigates these hurdles effectively, it may provide a template for other nations seeking to assert control over their digital ecosystems and reduce strategic vulnerabilities tied to global tech dependencies.