CVE-2025-49825
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-17

Last updated on: 2025-06-18

Assigner: GitHub, Inc.

Description
Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-17
Last Modified
2025-06-18
Generated
2026-05-07
AI Q&A
2025-06-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a remote authentication bypass in Teleport Community Edition versions up to 17.5.1. It allows an attacker to bypass authentication remotely, potentially gaining unauthorized access to the system.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized remote access with full confidentiality, integrity, and availability impact, meaning attackers could fully compromise the affected system.


What immediate steps should I take to mitigate this vulnerability?

Since there is no available open-source patch for this remote authentication bypass vulnerability in Teleport Community Edition versions before and including 17.5.1, immediate mitigation steps include restricting network access to Teleport services, implementing additional authentication controls where possible, monitoring for suspicious access attempts, and planning to upgrade to a patched version once available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart