Unpatched Zero-Day Vulnerability in Mitel MiCollab Exposes Businesses to Serious Security Risks
A newly disclosed zero-day vulnerability in the Mitel MiCollab collaboration platform has raised serious concerns regarding the security of sensitive business data. Discovered by security researchers at watchTowr, the vulnerability (yet to receive a CVE identifier) enables arbitrary file reading on affected systems. When exploited in conjunction with a previously patched critical vulnerability (CVE-2024-41713), attackers can gain unauthorized access to confidential information and critical system files.
This vulnerability affects the NuPoint Unified Messaging (NPM) component of MiCollab, a widely deployed platform used by businesses for voice communication, video conferencing, file sharing, and other collaborative functions. With over 16,000 MiCollab instances publicly accessible, the potential attack surface is substantial.
The vulnerability stems from insufficient input validation allowing authenticated users to read arbitrary files, including sensitive system files such as /etc/passwd. Combined with CVE-2024-41713, this flaw enables a complete authentication bypass, granting attackers unfettered access to the system.
In May, watchTowr researchers identified a critical vulnerability, CVE-2024-35286 (CVSS score: 9.8), in the NuPoint Unified Messaging (NPM) component of the MiCollab platform. This flaw allowed unauthorized users to access sensitive information and perform database operations. The issue was patched in May.
watchTowr responsibly disclosed the vulnerability to Mitel on August 26th, 2024. Despite assurances from Mitel that a patch would be released in early December, the vulnerability remains unaddressed as of December 6th. To emphasize the severity of the risk and encourage immediate mitigation efforts, watchTowr has released a proof-of-concept (PoC) exploit demonstrating the vulnerability’s potential impact.
Related Posts:
- Researchers Detail Critical PHP Flaw CVE-2024-4577 with PoC Exploit Code
- Technical Details Released for Check Point Remote Access VPN 0-Day Flaw
- CVE-2024-41713 (CVSS 9.8): Unpatched MiCollab Vulnerability Allows Unauthorized Access
- Mitel Issues Critical Security Advisory for PHP Argument Injection Vulnerability
- CVE-2024-47223 (CVSS 9.4): SQLi Flaw in Mitel MiCollab Poses Severe Risk to Enterprises