EUVD-2025-18566

| CVE-2025-49825 CRITICAL
9.8
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18566
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
CVE Published
Jun 17, 2025 - 22:15 nvd
CRITICAL 9.8

DescriptionNVD

Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.

AnalysisAI

Critical remote authentication bypass vulnerability affecting Teleport Community Edition versions 17.5.1 and earlier, allowing unauthenticated attackers to completely compromise authentication mechanisms over the network without any user interaction. With a CVSS score of 9.8 and no available open-source patch at disclosure, this vulnerability represents an immediate threat to all affected Teleport deployments, enabling full system compromise including confidentiality, integrity, and availability violations.

Technical ContextAI

Teleport is an infrastructure connectivity and access control platform that acts as a centralized authentication and audit gateway. The vulnerability resides in the Community Edition authentication subsystem (likely affecting CPE patterns: cpe:2.3:a:gravitational:teleport:*:*:*:*:community:*). CWE-863 (Incorrect Authorization) indicates the root cause is improper validation of authentication credentials or session tokens, allowing attackers to bypass the authentication layer entirely. This affects the core security function of the platform—the authentication module that should validate all access requests before granting access to infrastructure resources. The bypass is network-accessible (AV:N) with no authentication prerequisites (PR:N) and no user interaction required (UI:N), suggesting the flaw exists in the initial authentication handshake or token validation logic.

Vendor StatusVendor

Share

EUVD-2025-18566 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy