
In a newly published security advisory, Mitel has disclosed two critical vulnerabilities affecting several of its SIP phone product lines—including the 6800 Series, 6900 Series, 6900w Series, and the 6970 Conference Unit. The flaws, tracked as CVE-2025-47188 (critical) and CVE-2025-47187 (medium), pose significant risks if exploited by an unauthenticated attacker on the same network.
CVE-2025-47188: Command Injection (CVSS 9.8 – Critical)
This vulnerability stems from insufficient parameter sanitization, allowing a remote, unauthenticated attacker to inject and execute arbitrary commands on the affected device. According to the advisory:
“A successful exploit of this vulnerability could allow an attacker to execute arbitrary commands within the context of the phone leading to disclosure or modification of sensitive system and user configuration data, and potentially affecting device availability and operation.”
With a CVSS v3.1 score of 9.8, this is a critical flaw that grants an attacker broad access to the underlying system—potentially compromising VoIP infrastructure and sensitive communications.
CVE-2025-47187: Unauthenticated File Upload (CVSS 5.3 – Medium)
The second vulnerability arises from improper authentication mechanisms, allowing attackers to upload arbitrary WAV files to the phone:
“A successful exploit… could allow an attacker to upload arbitrary WAV files, which may potentially exhaust the phone’s storage without affecting the phone’s availability or operation.”
Though rated as medium, this flaw can still be used to degrade device functionality or serve as a precursor to more complex attacks in environments where phones are poorly segmented from other systems.
Affected Devices and Versions
The vulnerabilities impact the following Mitel devices running firmware version R6.4.0.SP4 and earlier:
- Mitel 6800 Series SIP Phones
- Mitel 6900 Series SIP Phones
- Mitel 6900w Series SIP Phones
- Mitel 6970 Conference Unit
Mitigation and Recommendations
Mitel advises immediate updates to firmware version R6.4.0.SP5 or later for all affected devices. For customers unable to upgrade promptly, the vendor also recommends reviewing mitigation steps outlined in Knowledge Base article SO8496.
Related Posts:
- Mitel Issues Critical Security Advisory for PHP Argument Injection Vulnerability
- Microsoft details the CVE-2023-32369 flaw in macOS that could bypass SIP root restrictions
- Microsoft Unveils CVE-2024-44243: A macOS System Integrity Protection Bypass Through Kernel Extensions
- Unpatched Zero-Day Vulnerability in Mitel MiCollab Exposes Businesses to Serious Security Risks
- Aquabotv3: The Mirai-Based Botnet Exploiting CVE-2024-41710 for DDoS Attacks