We typically bring the importance of ensuring not allowing software applications to grant “unattended access” (the act of giving remote control without user acceptance) as a first point of call. The exception being to ourselves, as our remote monitoring and management application uses this methodology; however, all of our platforms are MFA (Multi-Factor Authentication) secured. This practice is one of the many ways to ensure your IT infrastructure is kept secure. However, a Teamviewer vulnerability in the form of a high-severity flaw has been discovered by a security engineer at Praetorian (Jeffrey Hofmann) in previous versions of TeamViewer, specifically any versions released before v15.8.3.
I’ve included some links in the above paragraph which break the vulnerability down at a technical level, but in laymen’s terms, the exploit could potentially expose authentication requests allowing capture of passwords for future cracking attempts. The exploit involves a malicious third party sending a user an NTLM authentication request, making a user input a password which the third party can track keystroke for keystroke, storing for later use in hacking activities.
We implore you to check software that has been installed to your business’ devices! Have your staff taken it upon themselves to install Teamviewer or other remote access applications without notifying you or completing a declaration of installation requirements? Do you know what version of Teamviewer they’ve installed? Further more, are you in control of who has any form of remote access to your business therefore your most valued asset by proxy, your data? If this Teamviewer vulnerability has you concerned, take solace in our remote monitoring agent; we can audit installed applications and their software versions in a matter of minutes. Please don’t hesitate to contact us if you’re concerned by this Teamviewer security risk; as what we do today secures your business for tomorrow.