A newly disclosed critical vulnerability in Mitel MiCollab, identified as CVE-2024-41713 (CVSS score: 9.8), has been found to allow attackers to exploit a path traversal flaw to access sensitive files and perform unauthorized administrative actions. The issue stems from insufficient input validation in the NuPoint Unified Messaging (NPM) component, enabling malicious HTTP requests to access the root directory of the application server. MiCollab, an enterprise-grade communication platform integrating chat, voice, video, and SMS capabilities, is widely deployed, making this vulnerability particularly concerning.
Researchers at WatchTowr Labs uncovered the flaw during their efforts to reproduce another critical NPM vulnerability, CVE-2024-35286, previously patched by Mitel. They also identified an unpatched arbitrary file read flaw, which can be chained with CVE-2024-41713 to extract provisioning data and other sensitive system information. Although this secondary flaw does not allow privilege escalation or file modification, its exploitation can still undermine the confidentiality and availability of affected systems.
Mitel addressed CVE-2024-41713 in MiCollab version 9.8 SP2 (9.8.2.12), released on October 9, 2024, and urged users to update immediately. This update also resolved a separate SQL injection vulnerability (CVE-2024-47223, CVSS score: 9.4) in the Audio, Web, and Video Conferencing (AWV) component, which could allow attackers to execute database queries and compromise system integrity. Mitel emphasized the critical need for organizations to apply these patches to safeguard their systems.
The discovery underscores the importance of proactive vulnerability management, particularly in commercial off-the-shelf (COTS) solutions. Security researchers highlighted that full access to source code is not always necessary to exploit such vulnerabilities; detailed CVE descriptions and skilled internet searches can often suffice. This serves as a stark reminder for organizations to prioritize regular patching and implement robust security measures to mitigate risks posed by evolving cyber threats.
Reference: