← Zuruck zu CVEs
CVE-2024-55550
LOWCISA KEV2.7
Beschreibung
Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
CVE Details
CVSS v3.1 Bewertung2.7
SchweregradLOW
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienHIGH
BenutzerinteraktionNONE
Veroffentlicht12/10/2024
Zuletzt geandert11/4/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerMitel
ProduktMiCollab
SchwachstellennameMitel MiCollab Path Traversal Vulnerability
KEV Aufnahmedatum2025-01-07
Behebungsfrist2025-01-28
Ransomware-NutzungKnown
Betroffene Produkte
mitel:micollab
Schwachen (CWE)
CWE-22CWE-22
Referenzen
https://www.mitel.com/support/security-advisories(cve@mitre.org)
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-55550(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.