Critical remote authentication bypass flaw reported in Teleport access management platform
Take action: If you use self-hosted Teleport for infrastructure access, this is urgent and important. Immediately update to the latest patched version for your branch (17.5.2, 16.5.12, 15.5.3, 14.4.1, 13.4.27, or 12.4.35). Make sure to update both your Teleport proxy servers AND all agents - the vulnerability isn't fully patched until both components are upgraded.
Learn More
Teleport, a widely used open-source platform for secure access to servers, cloud applications, and infrastructure, is reporting acritical security vulnerability that allows remote authentication bypass.
The vulnerability is tracked as CVE-2025-49825 (CVSS score 9.8) and enables remote attackers to bypass authentication controls entirely, potentially granting unauthorized access to sensitive systems, servers, databases, and cloud applications managed through Teleport.
The technical details of the vulnerability have not been disclosed due to an embargo period ending June 30, 2025. Teleport claims they will provide a full technical disclosure and open-source patch details after this embargo period to allow all users sufficient time to upgrade their systems.
The vulnerability impacts multiple deployment scenarios and system configurations:
- Self-hosted Teleport deployments running vulnerable versions
- Teleport SSH agents and proxy servers
- OpenSSH-integrated deployments using Teleport
- Teleport Git proxy setups
- Systems running Teleport Community Edition versions up to 17.5.1
- Earlier major releases across multiple version branches
All Teleport versions prior to the following patched releases are affected:
- Versions before 17.5.2 in the 17.x branch
- Versions before 16.5.12 in the 16.x branch
- Versions before 15.5.3 in the 15.x branch
- Versions before 14.4.1 in the 14.x branch
- Versions before 13.4.27 in the 13.x branch
- Versions before 12.4.35 in the 12.x branch
Teleport has released patched versions across all supported major releases. The company has designated these specific patch versions as "Critical Security Exception Versions" and temporarily removed Community Edition restrictions on employee count and revenue thresholds for organizations that apply the patches within thirty days of their official release.
For Teleport Cloud customers, control plane updates were applied automatically during the disclosure process. Agents enrolled in Managed Updates v2 were automatically updated to patched versions during scheduled maintenance windows. Self-hosted users must manually upgrade all Teleport agents and proxies to the patched versions that match their cluster's major version.
The company requires both Proxy and Teleport agents to be upgraded for full mitigation of the vulnerability. Organizations are also strongly recommended to update Teleport clients to the released patch versions as an additional precautionary measure.
For self-hosted deployments, administrators should immediately identify agents not enrolled in Managed Updates v2 using "tctl inventory ls" commands and upgrade these agents using standard package managers (apt, yum) or enroll them in Managed Updates v2 by running "sudo teleport-update enable." Kubernetes deployments require updates using the teleport-kube-agent updater.