The CBIS/NCS Manager API is vulnerable to an authentication bypass. By sending a specially crafted HTTP header, an unauthenticated user can gain unauthorized access to API functions. This flaw allows attackers to reach restricted or sensitive endpoints of the HTTP API without providing any valid credentials. The root cause of this vulnerability lies in a weak verification mechanism within the authentication implementation present in the Nginx Podman container on the CBIS/NCS Manager host machine. The risk can be partially mitigated by restricting access to the management network using external firewall.
History

Thu, 18 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-288
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 18 Sep 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Nokia
Nokia cbis
Nokia ncs
Vendors & Products Nokia
Nokia cbis
Nokia ncs

Thu, 18 Sep 2025 06:15:00 +0000

Type Values Removed Values Added
Description The CBIS/NCS Manager API is vulnerable to an authentication bypass. By sending a specially crafted HTTP header, an unauthenticated user can gain unauthorized access to API functions. This flaw allows attackers to reach restricted or sensitive endpoints of the HTTP API without providing any valid credentials. The root cause of this vulnerability lies in a weak verification mechanism within the authentication implementation present in the Nginx Podman container on the CBIS/NCS Manager host machine. The risk can be partially mitigated by restricting access to the management network using external firewall.
Title Authentication Bypass
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Nokia

Published: 2025-09-18T06:10:27.787Z

Updated: 2025-09-18T18:01:12.717Z

Reserved: 2023-11-27T09:09:46.615Z

Link: CVE-2023-49564

cve-icon Vulnrichment

Updated: 2025-09-18T18:00:45.885Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-18T06:15:33.087

Modified: 2025-09-18T18:15:36.343

Link: CVE-2023-49564

cve-icon Redhat

No data.