Description
Security fixes
This patch addresses two security vulnerabilities.
Impacted users are recommended to upgrade their auth and database services to the latest version.
For Teleport Cloud customers, your control plane has already been upgraded to a patched release.
[High] Cross-node session recording access
When checking system service access to session recordings and audit logs, Teleport did not
perform sufficient authorization. This could allow a compromised Teleport SSH node service to
access audit events and session recordings from other nodes in the cluster.
All users are advised to upgrade their Auth services to the patched v17 release.
[Medium] SSRF via AWS database access endpoint
Teleport did not sufficiently validate the connection endpoint for AWS database access
(DynamoDB, OpenSearch, Keyspaces). This could allow a malicious actor with access to Teleport
configuration to steal database access credentials by crafting a connection endpoint pointing to
their domain.
All users that use Teleport to access AWS-hosted databases (DynamoDB, OpenSearch, Keyspaces)
are advised to upgrade their auth and database services to the patched v17 release
Other fixes and improvements
Changelog:
- Initialize keystore sign and decrypt metrics at startup. #66109
- Updated
jackc/pgxpackages to fix CVE-2026-4427/CVE-2026-32286, CVE-2026-33815, CVE-2026-33816, GHSA-j88v-2chj-qfwx. #66093 - Added
teleport_app_active_sessionsPrometheus gauge withapplabel for app access agent autoscaling. #66049 - Fixed a "No such process" error that could happen on the very first launch of VNet on macOS. #65968
- Fixed a Teleport Connect issue on Windows where startup could fail when
HTTPS_PROXYis set. #65925 - Initialize backend read and requests metrics to zero at startup. #65901
- Fixed Teleport not taking over an existing unmanaged host user when configured to. #65837
- Fixes potential race condition in dynamoDB backend which can lead to missed events, resulting in a inconsistent cache state. #65822
- Fixed an issue in Teleport Connect on macOS where selecting "Open Teleport Connect" from the menu bar would not reliably open the app. #65773
- Updated github.com/go-git/go-git/v5 to resolve CVE-2026-34165. #65649
- Updated OpenTelemetry dependencies to address CVE-2026-24051. #65647
- Update Go to v1.25.9. #65587
- Fixed "tctl edit" bugs when editing multiple resources, or resources with sub_kinds (for example, CAs). #65343
- Removed expired Baltimore CyberTrust Root CA used for Azure databases. #65328
- Reimplemented how Teleport Connect handles deep links for Device Trust auth and launching VNet from the Web UI. #65317
- Fixed minor bug in Web UI and Connect where static and dynamic labels with the same key are duplicated. #65295
- Fixed a goroutine leak in the Teleport Connect MFA prompt when both SSO MFA and Webauthn are available second factors. #65230
- Fixed an issue that allowed bypassing Resource Access Requests' AllowedResourceIDs when creating app sessions. #65117
- Fixed an issue that allowed IP Pinning protections to be bypassed via direct dial to a Teleport Node. #65095
- Fixed an issue that allowed IP Pinning protections to be bypassed via the WebUI. Also fix an issue with sporadic WebUI connection errors when the Proxy sees an unexpected client IP even though IP Pinning is not enforced. #65093
- Fixed intermittent issues with VNet on Windows with NRPT rules being wiped after Group Policy refresh. #65018
- Device Trust is now accessible under Zero Trust Access in the web UI. #65006
- Fixed an issue with desktop directory sharing in Teleport Connect that caused file modification times not to be displayed. #64920
- Fixed an issue preventing Teleport Connect from launching on Windows when the OS username contains non-ASCII characters. #64886
- API rate limiting for authenticated per-session MFA requests now follows the regular API rate limits, making the limit unlikely to be hit during parallel SSH operations. #64776
- Print a message indicating that
tctl recordings download <session_id>completed successfully. #64722 - Updated github.com/docker/cli to v29.2.0+incompatible (addresses CVE-2025-15558). #64608
- Teleport Connect now displays the Message of the Day (MOTD) before login. #64550
- Fixed bug that causes Windows desktop connection errors on EC2 joined nodes. #64546
- Fixed
tsh login --request-idto display up to date profile information including the assumed access request and roles. #64537 - Fixed error handling around empty uploads to ensure upload resources are consistently cleaned up. #64501
- Update Go to v1.25.8. #64435
- Fixed failures to record extra large session events in synchronous recording modes. #64344
- Fixed a rare race condition causing initial node heartbeats to be missing an address. #64331
Enterprise:
- Fix Okta assignment reconciliation failing for applications with large user lists where the API response time exceeded the 30s HTTP client timeout by increase the Okta http connection Timeout to 5 min.
- Device Trust is now accessible under Zero Trust Access in the web UI.
- Fixed an error log and a memory leak when manually deleting an okta_assignment resource.
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
Plugins
Download the current release of Teleport plugins from the links below.
- Slack Linux amd64 | Linux arm64
- Mattermost Linux amd64 | Linux arm64
- Discord Linux amd64 | Linux arm64
- Terraform Provider Linux amd64 | Linux arm64 | macOS amd64 | macOS arm64 | macOS universal
- Event Handler Linux amd64 | Linux arm64 | macOS amd64
- PagerDuty Linux amd64 | Linux arm64
- Jira Linux amd64 | Linux arm64
- Email Linux amd64 | Linux arm64
- Microsoft Teams Linux amd64 | Linux arm64
labels: security-patch=yes,security-patch-alts=v17.7.22