First published: Fri Jul 13 2018(Updated: )
On iOS and Android devices, the ShoreTel Mobility Client app version 9.1.3.109 fails to properly validate SSL certificates provided by HTTPS connections, which means that an attacker in the position to perform MITM attacks may be able to obtain sensitive account information such as login credentials.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel Shortel Mobility Client | =9.1.3.109 | |
Mitel Shortel Mobility Client | =9.1.3.109 |
ShoreTel has released version 9.1.5.104 for all devices to address the vulnerability.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6562 is classified as a high severity vulnerability due to its potential for exploitation through man-in-the-middle attacks.
To fix CVE-2016-6562, users should update the ShoreTel Mobility Client app to the latest version that addresses SSL certificate validation.
CVE-2016-6562 affects the ShoreTel Mobility Client version 9.1.3.109 on both Android and iOS devices.
An attacker exploiting CVE-2016-6562 may obtain sensitive account information transmitted over unverified HTTPS connections.
CVE-2016-6562 is vulnerable to man-in-the-middle (MITM) attacks due to improper SSL certificate validation.