Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Authentication Bypass Flaw Patched in Teleport

Posted on June 23, 2025June 23, 2025 By CWS

Teleport on Friday warned of a critical-severity vulnerability within the open supply platform that may be exploited remotely to bypass commonplace authentication controls.

Teleport gives connectivity, authentication, and entry management for servers and cloud functions. It helps protocols similar to SSH, RDP, and HTTPS, and can be utilized with Kubernetes and numerous databases.

Tracked as CVE-2025-49825 (CVSS rating of 9.8), the important flaw may be exploited to avoid SSH authentication, permitting attackers to entry Teleport-managed programs.

The problem impacts Teleport Neighborhood Version variations as much as 17.5.1 and was addressed with the discharge of Teleport variations 17.5.2, 16.5.12, 15.5.3, 14.4.1, 13.4.27, and 12.4.35.

Teleport notes that whereas the fixes have been robotically utilized for its cloud clients, self-hosted Teleport brokers must be up to date as quickly as attainable. Teleport brokers which were robotically locked as a result of they have been operating weak software program variations must be up to date.

“All nodes must be upgraded to the patched model of Teleport that matches the most important model of your cluster,” Teleport introduced.

Brokers operating in Kubernetes must be configured with the teleport-kube-agent updater, and never teleport-update, Teleport mentioned.

In accordance with Fortinet, the vulnerability impacts all programs operating Teleport SSH brokers, OpenSSH-integrated deployments, and Teleport Git proxy setups.Commercial. Scroll to proceed studying.

“At present, there is no such thing as a public proof-of-concept exploit out there, nor any proof indicating that this vulnerability has been exploited within the wild,” Fortinet says.

Associated: Excessive-Severity Vulnerabilities Patched by Cisco, Atlassian

Associated: Essential Vulnerability Patched in Citrix NetScaler

Associated: Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Merchandise

Security Week News Tags:Authentication, Bypass, Critical, Flaw, Patched, Teleport

Post navigation

Previous Post: 743,000 Impacted by McLaren Health Care Data Breach
Next Post: XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks

Related Posts

Sploitlight: macOS Vulnerability Leaks Sensitive Information Security Week News
ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact  Security Week News
ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets Security Week News
Ransomware Losses Climb as AI Pushes Phishing to New Heights Security Week News
Fortinet, Ivanti, Nvidia Release Security Updates Security Week News
Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News