TeamViewer is a remote desktop software that is as popular as much as it is interesting, since it allows access to a computer from the next room or from the other side of the world via the Internet TeamViewer offers remote control, desktop sharing, online meetings, web conferencing, remote printing or file transfer functions between computers. Powerful and powerful tools available for all major platforms – Windows, Mac, Linux, mobile, or even the Raspberry Pi.
From there comes the following and the title of this article because a security vulnerability is a problem for computers and networks. Since a high risk vulnerability has been found for Windows being its code (CVE 2020-13699), and the problem is that if it is breached it can be exploited and could allow remote attackers to steal the system password and eventually compromise it.
What is more worrying is that the attack can be executed almost automatically without requiring much interaction from the victims, simply convincing them to visit a malicious web page prepared for this purpose only once. In simple terms, an attacker can take advantage of the TeamViewer URI scheme from a web page to trick the application installed on the victim’s system for malicious purposes.
But for our luck a patch has already been released to counteract this vulnerability and users are strongly recommended to update to the latest version 15.8.3 where the vulnerability has been corrected to prevent our information and equipment from being compromised.