WARNING: CRITICAL PATH TRAVERSAL VULNERABILITY IN MITEL MICOLLAB, POC AVAILABLE FOR CVE-2024-41713, PATCH IMMEDIATELY!

Image
Decorative image
Published : 12/12/2024

Reference:
Advisory #2024-292

Version:
1.0

Affected software:
Mitel MiCollab 9.8 SP1 FP2 (9.8.1.201) and earlier

Type:
Path traversal

CVE/CVSS:
CVE-2024-41713 / CVSS 9.1(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Sources

Mitel Security Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029

Risks

A critical path traversal vulnerability has been identified in Mitel MiCollab. MiCollab is widely used in enterprises for voice and video calling, messaging, and team collaboration. It is particularly attractive to threat actors due to its integration in critical communication infrastructure.

Exploitation of these vulnerabilities can lead to severe consequences such as unauthorized access to sensitive communications, interception, and disruption of telephone services. Because these flaws could result in significant data breaches and operational disruptions, immediate patching and increased monitoring are crucial to mitigate these risks.

A proof-of-concept (PoC) exploit has been published, increasing the likelihood of exploitation by both sophisticated and opportunistic threat actors. Mitel MiCollab has been previously targeted by malicious actors, underscoring the platform's appeal to cybercriminals.

Description

CVE-2024-41713: A critical path traversal vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab could allow an unauthenticated attacker to conduct a path traversal attack due to insufficient input validation. This vulnerability is exploitable without authentication. If the vulnerability is successfully exploited, an attacker could gain unauthenticated access to information and perform unauthorized administrative actions on the MiCollab Server.

Recommended Actions

Patch
The Centre for Cybersecurity Belgium strongly recommends upgrading to MiCollab 9.8 SP2 (9.8.2.12) or later. If upgrading is for some reason not possible, Mitel also provided a patch for releases 9.7 and above.

Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.

In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident.

While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.

References

NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-41713