Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Authentication Bypass Flaw Patched in Teleport

Critical Authentication Bypass Flaw Patched in Teleport

Posted on June 23, 2025June 23, 2025 By CWS

Teleport on Friday warned of a critical-severity vulnerability within the open supply platform that may be exploited remotely to bypass commonplace authentication controls.

Teleport gives connectivity, authentication, and entry management for servers and cloud functions. It helps protocols similar to SSH, RDP, and HTTPS, and can be utilized with Kubernetes and numerous databases.

Tracked as CVE-2025-49825 (CVSS rating of 9.8), the important flaw may be exploited to avoid SSH authentication, permitting attackers to entry Teleport-managed programs.

The problem impacts Teleport Neighborhood Version variations as much as 17.5.1 and was addressed with the discharge of Teleport variations 17.5.2, 16.5.12, 15.5.3, 14.4.1, 13.4.27, and 12.4.35.

Teleport notes that whereas the fixes have been robotically utilized for its cloud clients, self-hosted Teleport brokers must be up to date as quickly as attainable. Teleport brokers which were robotically locked as a result of they have been operating weak software program variations must be up to date.

“All nodes must be upgraded to the patched model of Teleport that matches the most important model of your cluster,” Teleport introduced.

Brokers operating in Kubernetes must be configured with the teleport-kube-agent updater, and never teleport-update, Teleport mentioned.

In accordance with Fortinet, the vulnerability impacts all programs operating Teleport SSH brokers, OpenSSH-integrated deployments, and Teleport Git proxy setups.Commercial. Scroll to proceed studying.

“At present, there is no such thing as a public proof-of-concept exploit out there, nor any proof indicating that this vulnerability has been exploited within the wild,” Fortinet says.

Associated: Excessive-Severity Vulnerabilities Patched by Cisco, Atlassian

Associated: Essential Vulnerability Patched in Citrix NetScaler

Associated: Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Merchandise

Security Week News Tags:Authentication, Bypass, Critical, Flaw, Patched, Teleport

Post navigation

Previous Post: 743,000 Impacted by McLaren Health Care Data Breach
Next Post: XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks

Related Posts

Fighting the Cyber Forever War: Born Defense Blends Investment Strategy with Just War Principles Fighting the Cyber Forever War: Born Defense Blends Investment Strategy with Just War Principles Security Week News
Lema AI Secures M to Revolutionize Third-Party Risk Lema AI Secures $24M to Revolutionize Third-Party Risk Security Week News
Creating Realistic Deepfakes Is Getting Easier Than Ever. Fighting Back May Take Even More AI Creating Realistic Deepfakes Is Getting Easier Than Ever. Fighting Back May Take Even More AI Security Week News
Mississippi Clinics Close Amid Ransomware Disruption Mississippi Clinics Close Amid Ransomware Disruption Security Week News
EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China Security Week News
President Trump Orders Divestment in .9 Million Chips Deal to Protect US Security Interests President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark