CVE-2024-41714

A vulnerability in the Web Interface component of Mitel MiCollab through 9.8 SP1 (9.8.1.5) and MiVoice Business Solution Virtual Instance (MiVB SVI) through 1.0.0.27 could allow an authenticated attacker to conduct a command injection attack, due to insufficient parameter sanitization. A successful exploit could allow an attacker to execute arbitrary commands with elevated privileges within the context of the system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice_business_solution_virtual_instance:*:*:*:*:*:*:*:*

History

24 Jun 2025, 01:29

Type Values Removed Values Added
CPE cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*
cpe:2.3:a:mitel:mivoice_business_solution_virtual_instance:*:*:*:*:*:*:*:*
References () https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0021 - () https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0021 - Vendor Advisory
First Time Mitel
Mitel mivoice Business Solution Virtual Instance
Mitel micollab

Information

Published : 2024-10-21 21:15

Updated : 2025-06-24 01:29


NVD link : CVE-2024-41714

Mitre link : CVE-2024-41714

CVE.ORG link : CVE-2024-41714


JSON object : View

Products Affected

mitel

  • micollab
  • mivoice_business_solution_virtual_instance
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')