Mitel Product Security Advisory MISA-2024-0028

MiCollab SQL Injection Vulnerability

Advisory ID: MISA-2024-0028

Publish Date: 2024-10-09

Last Updated: 2024-10-09

Revision: 1.0

 

Summary

A SQL injection vulnerability in the Audio, Web and Video Conferencing (AWV) component of Mitel MiCollab could allow an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input.

A successful exploit of this vulnerability requires a specially crafted URL, and could allow impacts on the confidentiality, integrity and availability of the system.

If the vulnerability is successfully exploited, an attacker could get access to non-sensitive user provisioning information (such as names or email addresses) or run arbitrary SQL database queries to corrupt or remove tables, potentially rendering the MiCollab system inoperable.

The vulnerability severity is rated as critical.

Mitel is recommending customers with affected product versions update to the latest release. 

Credit is given to Patrick Webster of OSI Security for highlighting these issues and bringing these to our attention.

 

Affected Products

This security advisory provides information on the following products:
Product statements are related only to supported product versions. Products which have reached End of Support status are not considered.

 

Vulnerability Severity

The following products have been identified as affected:
The vulnerability severity is rated as critical.

 

Mitigations / Workarounds

Customers with affected product versions should upgrade to the highlighted solution versions or later.
The risk may be mitigated by following the instructions found in the KMS article.

 

Solution/ Recommended Action

This issue is corrected in MiCollab 9.8 SP2 (9.8.2.12). Customers are advised to upgrade to this or subsequent releases.

Please see Mitel Knowledge Base article SO8231, “MiCollab Security Update CVE-2024-47223 - SQL Injection Vulnerability” https://mitel.custhelp.com/app/answers/answer_view/a_id/1021022

If you do not have access to this link, please contact your Mitel Authorized Partner for support.

For further information, please contact Mitel Product Support.

 

Related CVEs / CWEs / Advisories

CVE-2024-47223

 

Revision History

Version Date Description
1.0 2024-10-09 Initial release


The information provided in this advisory is provided "as is" without warranty of any kind. The information is subject to change without notice. Mitel and its affiliates do not guarantee and accept no legal liability whatsoever arising from or connected to the accuracy, reliability, currency or completeness of the information provided. No part of this document can be reproduced or transmitted in any form or by any means - electronic or mechanical - for any purpose without written permission from Mitel Networks Corporation. 
Ready to talk to sales? Contact us.