Zero-Login Threat: Nokia CBIS & NCS Manager API Allows Auth Bypass Threat Analysis Report — By CyberDudeBivash
Date: September 20, 2025 (IST) Author : CyberDudeBivash
Executive summary
Nokia disclosed CVE-2023-49564, a critical authentication bypass in the CBIS/NCS Manager API. A specially crafted HTTP header can trick the service and grant unauthenticated access to restricted API functions. Nokia rates this CVSS 9.6 (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Access is typically limited to the management network (adjacent), but impact spans confidentiality, integrity, availability at the control plane of telecom cloud infrastructure. A fix is available. Nokia Corporation | Nokia
Related: Nokia also published CVE-2023-49565 (RCE) in the same stack, exploitable via the
/api/plugins
path with unsanitized headers; fixed builds are available. Defenders should assume chaining is possible in real-world attempts. Nokia Corporation | Nokia
What’s vulnerable & versions
-
CloudBand Infrastructure Software (CBIS): CBIS 22 affected. Fixed in CBIS 22 FP1 MP1.2. Nokia Corporation | Nokia
-
Nokia Container Service (NCS) Manager API: NCS 22.12 affected. Fixed in NCS 22.12 MP3. Nokia Corporation | Nokia
Advisory roundup: Canada’s Cyber Centre (AV25-602) also flags CBIS 22 and NCS 22.12 / 23.10 in Nokia’s September 18, 2025 advisories (covering the auth-bypass and the paired RCE). Apply vendor guidance immediately. Canadian Centre for Cyber Security
Technical snapshot (defender-focused)
-
CVE-2023-49564: Auth bypass via a crafted HTTP header against the CBIS/NCS Manager API running under Nginx in a Podman container on the manager host. Root cause: weak verification in the authentication implementation. Scope: reach sensitive API endpoints without credentials. Nokia notes restricting access to the management network as a partial risk reducer. Nokia Corporation | Nokia
-
CVE-2023-49565: RCE in
cbis_manager
via the/api/plugins
endpoint where certain headers (e.g., X-FILENAME, X-PAGE, X-FIELD) flow intosubprocess.Popen
without proper validation; service runs with root inside the container. Fixed in CBIS 22 FP1 MP1.2, NCS 22.12 MP3 / NCS 23.10 MP1. (Use header names for detection; do not test in prod.) Nokia Corporation | Nokia
Risk profile: If an attacker gets adjacent (VPN, jump host, mis-segmented VLAN, or exposed mgmt plane), CVE-2023-49564 can grant zero-login control to manager APIs; pairing with CVE-2023-49565 could yield code execution on management nodes. Nokia Corporation | Nokia+1
Immediate actions (24–72h)
-
Patch/upgrade:
-
CBIS 22 → FP1 MP1.2; NCS 22.12 → MP3; if running NCS 23.10, apply MP1 for the RCE companion issue. Nokia Corporation | Nokia+1
-
-
Constrain exposure (now):
-
Enforce external firewall rules so the Manager API is reachable only from an admin jump segment; block all Internet ingress. Nokia calls out mgmt-network restriction as partial mitigation. Nokia Corporation | Nokia
-
-
Credential/token hygiene:
-
Rotate admin/API tokens and service accounts used by orchestration/automation that talk to the Manager API.
-
-
Vendor notes: Track Nokia PSIRT page for deltas/MPs and confirm your build lineage. Nokia Corporation | Nokia
Detection & hunting (copy-ready ideas)
Focus: management-plane HTTP traffic to CBIS/NCS Manager.
-
Edge/network: Alert on new or unusual sources hitting Manager API ports/paths from non-admin subnets; flag adjacent paths traversing VPN concentrators. (Use your known-good allowlist.)
-
HTTP telemetry:
-
For CVE-2023-49564, hunt for requests with abnormal or out-of-profile custom headers accompanying calls to sensitive Manager API endpoints (no PoC strings here; rely on header rarity + method/path anomalies). Nokia Corporation | Nokia
-
For CVE-2023-49565, add high-fidelity detections on Manager API requests containing X-FILENAME / X-PAGE / X-FIELD headers with shell-metacharacters or atypical values; treat as block not just alert. Nokia Corporation | Nokia
-
-
Host/container: Look for Podman containers on manager hosts spawning unexpected child processes or outbound shells; flag
subprocess
invocations by the API service user. Nokia Corporation | Nokia -
Identity: Review recent VPN/privileged logins into admin segments; hunt for new endpoints initiating management calls.
Hardening checklist (telecom core / private 5G)
-
Segmentation: Physically/logically isolate Manager and control-plane networks; no direct user/ops workstation access.
-
MFA + PAM: Strong MFA on jump hosts; time-bound just-in-time admin rights for API usage.
-
Egress governance: Deny-by-default from manager containers; allowlist only update/telemetry destinations.
-
Inventory & SBOM: Track CBIS/NCS component versions; retain evidence of MP levels applied.
-
Backups & DR: Test config/state backups for Manager; validate you can re-provision the stack rapidly after a wipe.
Communication snippet (for ops change ticket)
-
“Applying Nokia CBIS/NCS security maintenance per Nokia PSIRT (CVE-2023-49564/-49565). We will restrict Manager API to admin subnet + upgrade to FP/MP builds as per advisory. Post-change, we’ll rotate tokens/creds and enforce new WAF header policies.” Nokia Corporation | Nokia+1
Source of truth & advisories
-
Nokia PSIRT — CVE-2023-49564 (Auth Bypass): description, CVSS 9.6, affected versions, fix: CBIS 22 FP1 MP1.2 / NCS 22.12 MP3, mitigation note on mgmt network. Nokia Corporation | Nokia
-
Nokia PSIRT — CVE-2023-49565 (RCE):
/api/plugins
header injection → command execution; fix: CBIS 22 FP1 MP1.2, NCS 22.12 MP3, NCS 23.10 MP1. Nokia Corporation | Nokia -
Canadian Cyber Centre AV25-602: recap of impacted product lines/versions and patching prompt (Sept 18, 2025). Canadian Centre for Cyber Security
#CyberDudeBivash #Nokia #CBIS #NCSManager #CVE202349564 #CVE202349565 #AuthBypass #RCE #TelecomSecurity #5GCore #CloudInfra #ThreatIntel
Comments
Post a Comment