← Back to CVEs
CVE-2024-55550
LOWCISA KEV2.7
Description
Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
CVE Details
CVSS v3.1 Score2.7
SeverityLOW
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published12/10/2024
Last Modified11/4/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorMitel
ProductMiCollab
Vulnerability NameMitel MiCollab Path Traversal Vulnerability
KEV Date Added2025-01-07
Remediation Due Date2025-01-28
Ransomware UseKnown
Affected Products
mitel:micollab
Weaknesses (CWE)
CWE-22CWE-22
References
https://www.mitel.com/support/security-advisories(cve@mitre.org)
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029(cve@mitre.org)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-55550(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.