The chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows before 6.4.15 and 7.x before 7.1.2 could allow an attacker to gain access to user information by sending certain code, due to improper input validation of http links. A successful exploit could allow an attacker to view user information and application data.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.mitel.com/support/security-advisories | Vendor Advisory | 
| https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0001 | Vendor Advisory | 
| https://www.mitel.com/support/security-advisories | Vendor Advisory | 
| https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0001 | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2021-01-29 07:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3176
Mitre link : CVE-2021-3176
CVE.ORG link : CVE-2021-3176
JSON object : View
Products Affected
                mitel
- businesscti_enterprise
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
