Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication

Nokia CBIS/NCS Manager API Vulnerability Let Attackers Bypass Authentication

Posted on September 19, 2025September 19, 2025 By CWS

A crucial authentication bypass vulnerability has emerged in Nokia’s CloudBand Infrastructure Software program (CBIS) and Nokia Container Service (NCS) Supervisor API, designated as CVE-2023-49564.

This high-severity flaw, scoring 9.6 on the CVSS v3.1 scale, allows unauthorized attackers to bypass authentication mechanisms via specifically crafted HTTP headers, doubtlessly granting full entry to restricted API endpoints with out legitimate credentials.

The vulnerability impacts CBIS 22 and NCS 22.12 variations, impacting enterprises, service suppliers, and public sector organizations using Nokia’s cloud and community infrastructure options.

The flaw was publicly disclosed on September 18, 2025, following discovery by Orange Cert researchers who recognized the safety hole throughout routine safety assessments.

Nokia safety researchers recognized the foundation trigger as a weak verification mechanism embedded inside the authentication implementation of the Nginx Podman container operating on the CBIS/NCS Supervisor host machine.

This architectural weak point permits risk actors to govern HTTP header fields to trick the authentication system into believing a request is legit.

The exploitation vector requires adjoining community entry (CVSS AV:A), making it significantly regarding for enterprise environments the place attackers may have already got gained preliminary community foothold.

As soon as exploited, the vulnerability supplies full compromise capabilities with excessive confidentiality, integrity, and availability impression, permitting attackers to entry delicate configuration information, modify system settings, and doubtlessly disrupt community operations.

Technical Assault Mechanism

The authentication bypass operates via header manipulation focusing on the Nginx container’s verification logic.

When processing API requests, the system fails to correctly validate authentication tokens embedded in HTTP headers, creating a chance for crafted requests to bypass safety controls.

The vulnerability permits unauthenticated customers to succeed in delicate endpoints that ought to require administrative privileges.

Vulnerability DetailsInformationCVE IDCVE-2023-49564CVSS Score9.6 (Essential)Assault VectorAdjacent NetworkAffected ProductsCBIS 22, NCS 22.12Fix VersionsCBIS 22 FP1 MP1.2, NCS 22.12 MP3

Organizations can partially mitigate dangers by implementing exterior firewall restrictions on administration community entry whereas making use of the patches offered in CBIS 22 FP1 MP1.2 and NCS 22.12 MP3 variations.

Discover this Story Attention-grabbing! Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates.

Cyber Security News Tags:API, Attackers, Authentication, Bypass, CBISNCS, Manager, Nokia, Vulnerability

Post navigation

Previous Post: Russian Hacking Groups Gamaredon and Turla Attacking Organizations to Deploy Kazuar Backdoor
Next Post: Top 10 Best API Security Testing Tools in 2025

Related Posts

Gootloader is Back with New ZIP File Trickery that Decive the Malicious Payload Gootloader is Back with New ZIP File Trickery that Decive the Malicious Payload Cyber Security News
China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure Cyber Security News
Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User Google Wear OS Message App Vulnerability Let Any Installed App To Send SMS Behalf Of User Cyber Security News
Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection Chinese UNC6384 Hackers Leverages Valid Code Signing Certificates to Evade Detection Cyber Security News
CodeIgniter Vulnerability Exposes Million of Webapps to File Upload Attacks CodeIgniter Vulnerability Exposes Million of Webapps to File Upload Attacks Cyber Security News
SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials SideWinder Hacker Group Hosting Fake Outlook/Zimbra Portals to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Find 341 Malicious ClawHub Skills Stealing Data from OpenClaw Users
  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • 30 Wind and Solar Farms in Poland Faced Coordinated Cyberattacks
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark