First published: Wed Aug 26 2020(Updated: )
An Authentication Bypass vulnerability in the Published Area of the web conferencing component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an unauthenticated attacker to gain access to unauthorized information due to insufficient access validation. A successful exploit could allow an attacker to access sensitive shared files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel MiCollab Audio, Web & Video Conferencing | <8.1.2.4 | |
Mitel MiCollab Audio, Web & Video Conferencing | >=9.0<9.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11797 has a high severity due to the potential for unauthorized access to sensitive information.
To fix CVE-2020-11797, upgrade Mitel MiCollab AWV to version 8.1.2.4 or 9.1.3 or later.
CVE-2020-11797 affects users of Mitel MiCollab Audio, Web, and Video Conferencing versions prior to 8.1.2.4 and between 9.0 and 9.1.3.
Yes, CVE-2020-11797 can lead to data breaches by allowing unauthenticated attackers access to unauthorized information.
CVE-2020-11797 is categorized as an Authentication Bypass vulnerability due to insufficient access validation.