Americas
Oceania
Advisory ID: 20-0006
Publish Date: 2020-06-01
Last Updated: 2020-07-16
Revision: 2.0
A Remote Code Execution vulnerability has been identified in the Connect Client of MiVoice Connect. This vulnerability if exploited could allow an attacker to execute arbitrary code in the chat notification window, due to improper rendering of chat messages. A successful exploit could allow an attacker to steal session cookies, directory traversal and run under the context of the chat client.
Mitel is recommending customers with affected product versions, update to the latest release.
Product Name | Product Version | Security Bulletin | Last Updated |
---|---|---|---|
MiVoice Connect Client | MiVoice Connect Client 214.100.1222.0 and earlier | 2020-07-16 |
The risk for this vulnerability is rated as Medium. Refer to the product Security Bulletins for additional statements regarding risk.
Mitel has issued new releases of the affected software. Customers are advised to update their software to the latest versions.
Customers are advised to review the product Security Bulletin. For additional information, contact Product Support.
Version | Date | Description |
---|---|---|
1.0 | 2020-06-01 | Initial version |
2.0 | 2020-07-16 | Updated version |