First published: Tue Mar 13 2018(Updated: )
A vulnerability in Mitel ST 14.2, release GA28 and earlier, could allow an attacker to use the API function to enumerate through user-ids which could be used to identify valid user ids and associated user names.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel ST 14.2 | <=ga28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16250 is classified as a medium severity vulnerability due to the potential for user enumeration.
To fix CVE-2017-16250, upgrade your Mitel ST 14.2 system to a version later than GA28.
CVE-2017-16250 affects users of Mitel ST 14.2, specifically those using release GA28 and earlier.
The impact of CVE-2017-16250 allows attackers to identify valid user IDs and associated usernames through the API.
While no specific exploit is publicly documented for CVE-2017-16250, the vulnerability's nature allows for potential enumeration attacks.