The N-central server is vulnerable to an authentication bypass of the user interface. This vulnerability is present in all deployments of N-central prior to 2024.2. This vulnerability was discovered through internal N-central source code review and N-able has not observed any exploitation in the wild.
Solution:
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.