The CBIS/NCS Manager API is vulnerable to an authentication bypass. By sending a specially crafted HTTP header, an unauthenticated user can gain unauthorized access to API functions. This flaw allows attackers to reach restricted or sensitive endpoints of the HTTP API without providing any valid credentials. The root cause of this vulnerability lies in a weak verification mechanism within the authentication implementation present in the Nginx Podman container on the CBIS/NCS Manager host machine.
The risk can be partially mitigated by restricting access to the management network using external firewall.
                
            References
                    Configurations
                    No configuration.
History
                    18 Sep 2025, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-288 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.8 | 
18 Sep 2025, 06:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-09-18 06:15
Updated : 2025-09-18 18:15
NVD link : CVE-2023-49564
Mitre link : CVE-2023-49564
CVE.ORG link : CVE-2023-49564
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-288
                        
            Authentication Bypass Using an Alternate Path or Channel
