First published: Fri Jan 29 2021(Updated: )
The chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows before 6.4.15 and 7.x before 7.1.2 could allow an attacker to gain access to user information by sending certain code, due to improper input validation of http links. A successful exploit could allow an attacker to view user information and application data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel Businesscti Enterprise | <6.4.15 | |
Mitel Businesscti Enterprise | >=7.0<7.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-3176.
The Mitel BusinessCTI Enterprise (MBC-E) Client for Windows versions before 6.4.15 and 7.x before 7.1.2 are affected.
The severity of CVE-2021-3176 is high with a CVSS score of 8.
An attacker can exploit this vulnerability by sending certain code through the chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows.
You can find more information about this vulnerability in the Mitel security advisories located at [https://www.mitel.com/support/security-advisories](https://www.mitel.com/support/security-advisories) and [https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0001](https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0001).