CVE-2021-41393
📋 TL;DR
This vulnerability in Teleport allows attackers to forge SSH host certificates in certain configurations, potentially enabling unauthorized access to systems. It affects Teleport versions before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1.
💻 Affected Systems
- Teleport
📦 What is this software?
Teleport by Goteleport
Teleport by Goteleport
Teleport by Goteleport
Teleport by Goteleport
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of SSH infrastructure allowing attackers to impersonate any host, intercept traffic, and gain unauthorized access to all systems managed by Teleport.
Likely Case
Unauthorized access to specific systems through forged host certificates, potentially leading to data exfiltration or lateral movement.
If Mitigated
Limited impact with proper network segmentation and certificate validation controls in place.
🎯 Exploit Status
Exploitation requires specific conditions and knowledge of Teleport's certificate handling.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.4.11, 5.2.4, 6.2.12, or 7.1.1 depending on your major version
Vendor Advisory: https://github.com/gravitational/teleport/releases
Restart Required: Yes
Instructions:
1. Identify your Teleport version. 2. Upgrade to the patched version for your major release. 3. Restart Teleport services. 4. Verify the upgrade was successful.
🔧 Temporary Workarounds
Restrict certificate authority access
allLimit access to Teleport's certificate authority to only trusted administrators
# Review and restrict CA access permissions in Teleport configuration
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Teleport infrastructure
- Enhance monitoring for unusual certificate issuance or SSH connection patterns
🔍 How to Verify
Check if Vulnerable:
Check Teleport version using 'teleport version' command and compare against affected versions
Check Version:
teleport version
Verify Fix Applied:
Verify version is 4.4.11+, 5.2.4+, 6.2.12+, or 7.1.1+ depending on major version
📡 Detection & Monitoring
Log Indicators:
- Unusual certificate issuance patterns
- SSH connections from unexpected hosts
- Failed certificate validation attempts
Network Indicators:
- SSH connections with unexpected host keys
- Traffic to/from unauthorized systems
SIEM Query:
source="teleport" AND (event="certificate.issued" OR event="ssh.session.start") | stats count by host, user
🔗 References
- https://github.com/gravitational/teleport/releases/tag/v4.4.11
- https://github.com/gravitational/teleport/releases/tag/v5.2.4
- https://github.com/gravitational/teleport/releases/tag/v6.2.12
- https://github.com/gravitational/teleport/releases/tag/v7.1.1
- https://github.com/gravitational/teleport/releases/tag/v4.4.11
- https://github.com/gravitational/teleport/releases/tag/v5.2.4
- https://github.com/gravitational/teleport/releases/tag/v6.2.12
- https://github.com/gravitational/teleport/releases/tag/v7.1.1