CVE-2023-42793: TeamCity Critical Auth Bypass (2023)

Score: 9.8
CRITICAL
Published: 2023-09-19Affected: JetBrains TeamCity < 2023.05.4CWE-288 β†—

Was TeamCity exploited by nation-state actors?

An authentication bypass in the JetBrains TeamCity on-premises server. Remote unauthenticated attackers can reach the TeamCity Server REST API and create a new admin user, leading to full build server compromise.

Impact & Exploitation

Exploited by North Korean Lazarus Group (Diamond Sleet) and Russian APT29. Enables source code theft, secret extraction, and supply chain attacks through the CI/CD pipeline.

Precogs Logo

Precogs Research

This vulnerability intelligence report was analyzed and enriched by the Precogs AI Security Team. Our researchers continuously monitor emerging threats across AI code, LLM pipelines, and binary architectures to ensure accurate real-time remediation guidance.

Is Your System Still Exposed to Critical CVEs?

Vulnerabilities like CVE-2023-42793 TeamCity Critical Auth Bypass (2023) don’t just exist in source code β€” they persist in compiled binaries, containers, and embedded systems. Precogs AI detects vulnerable components across your entire stack β€” even when source code isn’t available.