Show filters
114 Total Results
Displaying 41-50 of 114
Sort by:
Attacker Value
Unknown
CVE-2022-29855
Disclosure Date: May 11, 2022 (last updated November 29, 2024)
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution.
0
Attacker Value
Unknown
CVE-2022-29499
Disclosure Date: April 26, 2022 (last updated October 07, 2023)
The Service Appliance component in Mitel MiVoice Connect through 19.2 SP3 allows remote code execution because of incorrect data validation. The Service Appliances are SA 100, SA 400, and Virtual SA.
0
Attacker Value
Unknown
CVE-2022-26143
Disclosure Date: March 10, 2022 (last updated October 07, 2023)
The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.
0
Attacker Value
Unknown
CVE-2021-3352
Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The Software Development Kit in Mitel MiContact Center Business from 8.0.0.0 through 8.1.4.1 and 9.0.0.0 through 9.3.1.0 could allow an unauthenticated attacker to access (view and modify) user data without authorization due to improper handling of tokens.
0
Attacker Value
Unknown
CVE-2021-32069
Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The AWV component of Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack due to improper TLS negotiation. A successful exploit could allow an attacker to view and modify data.
0
Attacker Value
Unknown
CVE-2021-32067
Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to view sensitive system information through an HTTP response due to insufficient output sanitization.
0
Attacker Value
Unknown
CVE-2021-32068
Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The AWV and MiCollab Client Service components in Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack by sending multiple session renegotiation requests, due to insufficient TLS session controls. A successful exploit could allow an attacker to modify application data and state.
0
Attacker Value
Unknown
CVE-2021-27401
Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The Join Meeting page of Mitel MiCollab Web Client before 9.2 FP2 could allow an attacker to access (view and modify) user data by executing arbitrary code due to insufficient input validation, aka Cross-Site Scripting (XSS).
0
Attacker Value
Unknown
CVE-2021-32071
Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The MiCollab Client service in Mitel MiCollab before 9.3 could allow an unauthenticated user to gain system access due to improper access control. A successful exploit could allow an attacker to view and modify application data, and cause a denial of service for users.
0
Attacker Value
Unknown
CVE-2021-32072
Disclosure Date: August 13, 2021 (last updated February 23, 2025)
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to get source code information (disclosing sensitive application data) due to insufficient output sanitization. A successful exploit could allow an attacker to view source code methods.
0