Mitel Product Security Advisory MISA-2024-0029

MiCollab Path Traversal Vulnerability

Advisory ID: MISA-2024-0029

Publish Date: 2024-10-09

Last Updated: 2024-12-12

Revision: 4.0

 

Summary

A path traversal vulnerability, CVE-2024-41713, in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab could allow an unauthenticated attacker to conduct a path traversal attack due to insufficient input validation. 
A successful exploit of this vulnerability could allow an attacker to gain unauthorized access, with potential impacts to the confidentiality, integrity, and availability of the system. This vulnerability is exploitable without authentication. If the vulnerability is successfully exploited, an attacker could gain unauthenticated access to provisioning information including non-sensitive user and network information and perform unauthorized administrative actions on the MiCollab Server. The vulnerability severity is rated as critical. 

A path traversal vulnerability, CVE-2024-55550, in Mitel MiCollab could allow an authenticated attacker with administrative privilege to conduct a local file read within the system due to insufficient input sanitization.
A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation. The exposure is substantially mitigated by applying the available remediation and the vulnerability severity is rated as low. 

 

Mitel is recommending customers with affected product versions upgrade to the latest release.

Credit is given to Sonny Macdonald of watchTowr for highlighting the issue and bringing it to our attention.


 

Affected Products

This security advisory provides information on the following products:

 

Vulnerability Severity

The following products have been identified as affected:
The identified vulnerabilities carry varied levels of severity, ranging from Critical to Low.

 

Mitigations / Workarounds

Customers with affected product versions should upgrade to the highlighted solution versions or later. For customers who are not currently able to upgrade to the latest version in a timely manner, Mitel has provided a patch that is available for releases 6.0 and above.
See the KMS article for instructions regarding both the upgrade and the patch.

 

Solution/ Recommended Action

The critical severity issue, CVE-2024-41713, is corrected in MiCollab 9.8 SP2 (9.8.2.12). Customers are advised to upgrade to this or subsequent releases.  

The low severity local file read exposure, CVE-2024-55550, is substantially mitigated by MiCollab 9.8 SP2 (9.8.2.12). This low severity issue will be addressed in future product updates.

Please see Mitel Knowledge Base article SO8219, “MiCollab Security Update CVE-2024-41713 - Path Traversal Vulnerability” https://mitel.custhelp.com/app/answers/answer_view/a_id/1021001

If you do not have access to this link, please contact your Mitel Authorized Partner for support.

For further information, please contact Mitel Product Support.

 

Related CVEs / CWEs / Advisories

CVE-2024-41713, CVE-2024-55550

 

Revision History

Version Date Description
1.0 2024-10-09 Initial release
2.0 2024-12-05 Additional information provided
3.0 2024-12-09 Updated the CVE Number
4.0 2024-12-12 Updated the available solution with expanded release compatibility


The information provided in this advisory is provided "as is" without warranty of any kind. The information is subject to change without notice. Mitel and its affiliates do not guarantee and accept no legal liability whatsoever arising from or connected to the accuracy, reliability, currency or completeness of the information provided. No part of this document can be reproduced or transmitted in any form or by any means - electronic or mechanical - for any purpose without written permission from Mitel Networks Corporation. 
Ready to talk to sales? Contact us.