Teamviewer 13 switch sides
The second option would be to configure the options above from the Management Console ( on the account were the machines are assigned to) via TeamViewer Policy. That can be done in two ways, the first being going to the machine and opening the TeamViewer Options | Advanced | Show advanced options | General advanced settings, then set “Check for new version” to “weekly” and “Install new versions automatically” to “Updates within this major version”.
Gellin tested the vulnerability on TeamViewer x86 Version and it transpired that it can be exploited to enable the switch sides feature which an attacker can use to take control of victim’s PC during the desktop session.
#Teamviewer 13 switch sides update#
He can also in TeamViewer click on “Help | Check for new version” or set in TeamViewer options to update automatically. That means victim remains uninformed once TeamViewer permissions are modified. Just downloading the latest 11,12 or 13 from the website and overwriting will do it.
#Teamviewer 13 switch sides upgrade#
I'm referring to revision updates (aka upgrade from 5.0 to 0.0). That button suggests a new major version, which we don't have the license for (and likely many other customers). Go to "Help" in the menu and select "Check for new version". Preferably, I'd like to see a TeamViewer auto-update feature (not auto-update to another major version, just for things like this) that we could enable.īest thing to do is to update your TeamViewer version manually. So, where do we find the update? Just download the latest (11, 12, or 13) from the main site and overwrite, or is there a hotfix? Keep in mind a lot of us have big organizations and need an easy way to deploy this fix. Users to update their installation to the latest software version. Terminate a TeamViewer session at any time. Target any potential TeamViewer installation. Was limited as the exploit required a legitimate connection to be establishedįirst before it could have been applied. Attackers could not randomly Gain control of the system. However, the potential threat The vulnerability was firstĭescribed on GitHub and concerned TeamViewer’s set of permissions. In two different scenarios,Īttackers could either gain control of the victim’s mouse or switch sides to C++ DLL vulnerability was first brought to the attention of TeamViewer’sĮngineering team, the software maker provided a fix to address the issue.