The U.S. Cybersecurity and Infrastructure Security Agency (CISA) updates its Known Exploited Vulnerabilities Catalog by adding two Mitel MiCollab vulnerabilities. Tracked as CVE-2024-41713 and CVE-2024-55550, the vulnerabilities may allow a remote unauthenticated attacker to bypass authentication and view/modify sensitive data.
CVE-2024-41713 could be chained with CVE-2024-55550 to allow an unauthenticated, remote attacker to read arbitrary files on the server.
Mitel MiCollab is a unified communications and collaboration solution that allows employees to connect and work from anywhere, on any device, and anytime. MiCollab offers a variety of ways to communicate, including instant messaging, voice, desktop video, and web collaboration.
CISA also added an Oracle WebLogic Server vulnerability tracked as CVE-2020-2883. The vulnerability may allow an unauthenticated attacker with network access via IIOP or T3.
CISA urged users to patch all three vulnerabilities before January 25, 2025.
CVE-2024-41713
The vulnerability has a critical severity rating with a CVSS score of 9.8. The path traversal vulnerability exists in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab. The vulnerability originates from insufficient input validation. Exploitation of the vulnerability does not require any authentication. Successful exploitation of the vulnerability could allow an attacker to gain unauthorized access. Upon gaining access, an attacker could gain information, including non-sensitive user and network information, and perform unauthorized administrative actions on the MiCollab Server.
CVE-2024-55550
The path traversal vulnerability originates from insufficient input sanitization. An attacker must have administrative privilege to exploit the vulnerability. As per the advisory, “the successful exploitation of the vulnerability could allow the authenticated admin attacker to access resources constrained to the admin access level, and the disclosure is limited to non-sensitive system information.” The vulnerability does not allow file modification or privilege escalation.
Affected Versions
The vulnerabilities affect Mitel MiCollab versions 9.8 SP1 FP2 (9.8.1.201) and earlier.
Mitigation
Customers must upgrade to MiCollab version 9.8 SP2 (9.8.2.12) or later to patch the vulnerabilities.
Please refer to the Mitel Product Security Advisory (MISA-2024-0029) for more information.
Qualys Detection
Qualys customers can scan their devices with QID 731976 to detect vulnerable assets.
Please continue to follow Qualys Threat Protection for more coverage of the latest vulnerabilities.
References
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029