← Back to CVEs
CVE-2022-41223
MEDIUMCISA KEV6.8
Description
The Director database component of MiVoice Connect through 19.3 (22.22.6100.0) could allow an authenticated attacker to conduct a code-injection attack via crafted data due to insufficient restrictions on the database data type.
CVE Details
CVSS v3.1 Score6.8
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorADJACENT_NETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published11/22/2022
Last Modified11/3/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorMitel
ProductMiVoice Connect
Vulnerability NameMitel MiVoice Connect Code Injection Vulnerability
KEV Date Added2023-02-21
Remediation Due Date2023-03-14
Ransomware UseKnown
Affected Products
mitel:mivoice_connect
Weaknesses (CWE)
CWE-94CWE-94
References
https://www.mitel.com/support/security-advisories(cve@mitre.org)
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0008(cve@mitre.org)
https://www.mitel.com/support/security-advisories(af854a3a-2127-422b-91ae-364da2661108)
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0008(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-41223(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.