Filtered by vendor Mitel
Subscribe
Total
132 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-29855 | 1 Mitel | 18 6865i Sip, 6865i Sip Firmware, 6867i Sip and 15 more | 2024-11-21 | 7.2 HIGH | 6.8 MEDIUM |
Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution. | |||||
CVE-2022-29854 | 1 Mitel | 8 6905, 6910, 6920 and 5 more | 2024-11-21 | 7.2 HIGH | 6.8 MEDIUM |
A vulnerability in Mitel 6900 Series IP (MiNet) phones excluding 6970, versions 1.8 (1.8.0.12) and earlier, could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution. | |||||
CVE-2021-3352 | 1 Mitel | 1 Micontact Center Business | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
The Software Development Kit in Mitel MiContact Center Business from 8.0.0.0 through 8.1.4.1 and 9.0.0.0 through 9.3.1.0 could allow an unauthenticated attacker to access (view and modify) user data without authorization due to improper handling of tokens. | |||||
CVE-2021-3176 | 1 Mitel | 1 Businesscti Enterprise | 2024-11-21 | 6.0 MEDIUM | 8.0 HIGH |
The chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows before 6.4.15 and 7.x before 7.1.2 could allow an attacker to gain access to user information by sending certain code, due to improper input validation of http links. A successful exploit could allow an attacker to view user information and application data. | |||||
CVE-2021-37586 | 1 Mitel | 1 Interaction Recording | 2024-11-21 | 4.0 MEDIUM | 4.9 MEDIUM |
The PowerPlay Web component of Mitel Interaction Recording Multitenancy systems before 6.7 could allow a user (with Administrator rights) to replay a previously recorded conversation of another tenant due to insufficient validation. | |||||
CVE-2021-32072 | 1 Mitel | 1 Micollab | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to get source code information (disclosing sensitive application data) due to insufficient output sanitization. A successful exploit could allow an attacker to view source code methods. | |||||
CVE-2021-32071 | 1 Mitel | 1 Micollab | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The MiCollab Client service in Mitel MiCollab before 9.3 could allow an unauthenticated user to gain system access due to improper access control. A successful exploit could allow an attacker to view and modify application data, and cause a denial of service for users. | |||||
CVE-2021-32070 | 1 Mitel | 1 Micollab | 2024-11-21 | 5.8 MEDIUM | 5.4 MEDIUM |
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to perform a clickjacking attack due to an insecure header response. A successful exploit could allow an attacker to modify the browser header and redirect users. | |||||
CVE-2021-32069 | 1 Mitel | 1 Micollab | 2024-11-21 | 5.8 MEDIUM | 4.8 MEDIUM |
The AWV component of Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack due to improper TLS negotiation. A successful exploit could allow an attacker to view and modify data. | |||||
CVE-2021-32068 | 1 Mitel | 1 Micollab | 2024-11-21 | 4.3 MEDIUM | 3.7 LOW |
The AWV and MiCollab Client Service components in Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack by sending multiple session renegotiation requests, due to insufficient TLS session controls. A successful exploit could allow an attacker to modify application data and state. | |||||
CVE-2021-32067 | 1 Mitel | 1 Micollab | 2024-11-21 | 6.4 MEDIUM | 6.5 MEDIUM |
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to view sensitive system information through an HTTP response due to insufficient output sanitization. | |||||
CVE-2021-27402 | 1 Mitel | 1 Micollab | 2024-11-21 | 6.4 MEDIUM | 6.5 MEDIUM |
The SAS Admin portal of Mitel MiCollab before 9.2 FP2 could allow an unauthenticated attacker to access (view and modify) user data by injecting arbitrary directory paths due to improper URL validation, aka Directory Traversal. | |||||
CVE-2021-27401 | 1 Mitel | 1 Micollab | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
The Join Meeting page of Mitel MiCollab Web Client before 9.2 FP2 could allow an attacker to access (view and modify) user data by executing arbitrary code due to insufficient input validation, aka Cross-Site Scripting (XSS). | |||||
CVE-2021-26714 | 1 Mitel | 1 Micontact Center Enterprise | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Enterprise License Manager portal in Mitel MiContact Center Enterprise before 9.4 could allow a user to access restricted files and folders due to insufficient access control. A successful exploit could allow an attacker to view and modify application data via Directory Traversal. | |||||
CVE-2020-9379 | 1 Mitel | 1 Micontact Center Business | 2024-11-21 | 4.0 MEDIUM | 6.5 MEDIUM |
The Software Development Kit of the MiContact Center Business with Site Based Security 8.0 through 9.0.1.0 before KB496276 allows an authenticated user to access sensitive information. A successful exploit could allow unauthorized access to user conversations. | |||||
CVE-2020-35547 | 1 Mitel | 1 Micollab | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
A library index page in NuPoint Messenger in Mitel MiCollab before 9.2 FP1 could allow an unauthenticated attacker to gain access (view and modify) to user data. | |||||
CVE-2020-28351 | 1 Mitel | 2 Shoretel, Shoretel Firmware | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
The conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack (via the PATH_INFO to index.php) due to insufficient validation for the time_zone object in the HOME_MEETING& page. | |||||
CVE-2020-27640 | 1 Mitel | 4 Mivoice 6930, Mivoice 6930 Firmware, Mivoice 6940 and 1 more | 2024-11-21 | 4.8 MEDIUM | 8.1 HIGH |
The Bluetooth handset of Mitel MiVoice 6940 and 6930 MiNet phones with firmware before 1.5.3 could allow an unauthenticated attacker within Bluetooth range to pair a rogue Bluetooth device when a phone handset loses connection, due to an improper pairing mechanism. A successful exploit could allow an attacker to eavesdrop on conversations. | |||||
CVE-2020-27639 | 1 Mitel | 6 6873i Sip, 6873i Sip Firmware, 6930 Sip and 3 more | 2024-11-21 | 4.8 MEDIUM | 8.1 HIGH |
The Bluetooth handset of Mitel MiVoice 6873i, 6930, and 6940 SIP phones with firmware before 5.1.0.SP6 could allow an unauthenticated attacker within Bluetooth range to pair a rogue Bluetooth device when a phone handset loses connection, due to an improper pairing mechanism. A successful exploit could allow an attacker to eavesdrop on conversations. | |||||
CVE-2020-27340 | 1 Mitel | 1 Micollab | 2024-11-21 | 5.8 MEDIUM | 6.1 MEDIUM |
The online help portal of Mitel MiCollab before 9.2 could allow an attacker to redirect a user to an unauthorized website by executing malicious script due to insufficient access control. |