First published: Mon Jan 13 2020(Updated: )
An encryption key vulnerability on Mitel SIP-DECT wireless devices 8.0 and 8.1 could allow an attacker to launch a man-in-the-middle attack. A successful exploit may allow the attacker to intercept sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel SIP-DECT Firmware | =8.0 | |
Mitel SIP-DECT Firmware | =8.1 | |
Mitel SIP-DECT Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19891 is considered a high severity vulnerability due to the potential for man-in-the-middle attacks.
To fix CVE-2019-19891, upgrade the Mitel SIP-DECT firmware to versions 8.2 or later.
CVE-2019-19891 affects Mitel SIP-DECT wireless devices running firmware versions 8.0 and 8.1.
Yes, CVE-2019-19891 can be exploited remotely, allowing attackers to intercept sensitive information.
CVE-2019-19891 allows attackers to launch man-in-the-middle attacks on vulnerable Mitel devices.