Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Authentication Bypass Flaw Patched in Teleport

Posted on June 23, 2025June 23, 2025 By CWS

Teleport on Friday warned of a critical-severity vulnerability within the open supply platform that may be exploited remotely to bypass commonplace authentication controls.

Teleport gives connectivity, authentication, and entry management for servers and cloud functions. It helps protocols similar to SSH, RDP, and HTTPS, and can be utilized with Kubernetes and numerous databases.

Tracked as CVE-2025-49825 (CVSS rating of 9.8), the important flaw may be exploited to avoid SSH authentication, permitting attackers to entry Teleport-managed programs.

The problem impacts Teleport Neighborhood Version variations as much as 17.5.1 and was addressed with the discharge of Teleport variations 17.5.2, 16.5.12, 15.5.3, 14.4.1, 13.4.27, and 12.4.35.

Teleport notes that whereas the fixes have been robotically utilized for its cloud clients, self-hosted Teleport brokers must be up to date as quickly as attainable. Teleport brokers which were robotically locked as a result of they have been operating weak software program variations must be up to date.

“All nodes must be upgraded to the patched model of Teleport that matches the most important model of your cluster,” Teleport introduced.

Brokers operating in Kubernetes must be configured with the teleport-kube-agent updater, and never teleport-update, Teleport mentioned.

In accordance with Fortinet, the vulnerability impacts all programs operating Teleport SSH brokers, OpenSSH-integrated deployments, and Teleport Git proxy setups.Commercial. Scroll to proceed studying.

“At present, there is no such thing as a public proof-of-concept exploit out there, nor any proof indicating that this vulnerability has been exploited within the wild,” Fortinet says.

Associated: Excessive-Severity Vulnerabilities Patched by Cisco, Atlassian

Associated: Essential Vulnerability Patched in Citrix NetScaler

Associated: Code Execution Vulnerabilities Patched in Veeam, BeyondTrust Merchandise

Security Week News Tags:Authentication, Bypass, Critical, Flaw, Patched, Teleport

Post navigation

Previous Post: 743,000 Impacted by McLaren Health Care Data Breach
Next Post: XDigo Malware Exploits Windows LNK Flaw in Eastern European Government Attacks

Related Posts

Paragon ‘Graphite’ Spyware Linked to Zero-Click Hacks on Newest iPhones Security Week News
Marks & Spencer Expects Ransomware Attack to Cost $400 Million Security Week News
Like Ransoming a Bike: Organizational Muscle Memory Drives the Most Effective Response Security Week News
Who’s Really Behind the Mask? Combatting Identity Fraud Security Week News
Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List Security Week News
Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
  • Google Confirms Data Breach – Notifying Users Affected By the Cyberattack
  • How to Secure Public Cloud Storage
  • Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams
  • Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News