
Cloud Vulnerability DB
A community-led vulnerabilities database
Teleport before versions 4.4.11, 5.2.4, 6.2.12, and 7.1.1 contains a security vulnerability that allows alteration of build artifacts in some situations. The vulnerability was discovered during an internal security exercise affecting Teleport versions 4.4, 5, 6, and 7 (Teleport Release).
The vulnerability has a CVSS v3.1 base score of 5.3 (MEDIUM) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N. The vulnerability was identified in the Teleport build infrastructure that could potentially be exploited to modify build artifacts (NVD).
An attacker could potentially alter build artifacts in the Teleport build infrastructure. While no evidence of exploitation was found, the vulnerability could affect the integrity of Teleport's build process and resulting artifacts (Teleport Release).
Users are strongly recommended to upgrade to the patched versions: Teleport 4.4.11, 5.2.4, 6.2.12, or 7.1.1. The upgrade should follow the normal Teleport upgrade procedure as documented in their admin guide. All components of the Teleport cluster should be upgraded to ensure complete mitigation (Teleport Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."