Mitel Product Security Advisory 21-0001

Mitel BusinessCTI Enterprise - Remote Code Execution Vulnerability

Advisory ID: 21-0001

Publish Date: 2021-01-25

Last Updated: 2021-01-25

Revision: 1.0

 

Summary

The chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows could allow an attacker to gain access to user information by sending arbitrary code, due to improper input validation of http links. A successful exploit could allow an attacker to view the user information and application data.

Mitel is recommending customers with affected product versions, update to the latest release.

 

 

Affected Products

 

 

 

Risk Assessment

The risks for these vulnerabilities are rated as High. Refer to the product Security Bulletins for additional statements regarding risk.

 

Mitigation / Recommended Action

Mitel has issued new releases of the affected software. Customers are advised to update their software to the latest versions.

As a workaround, the chat functionality of Mitel BusinessCTI Enterprise (MBC-E) can be temporarily disabled to prevent the chat window from opening.

Mitel partners and customers are advised to review the product Security Bulletin. For additional information, contact Product Support.

 

External References

N/A

 

Related CVEs / CWEs / Advisories

CVE-2021-3176

 

Revision History

Ready to talk to sales? Contact us.