First published: Tue Nov 22 2022(Updated: )
The Director component in Mitel MiVoice Connect allows an authenticated attacker with internal network access to execute code within the context of the application.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel Connect | ||
Mitel Connect | <19.3 | |
Mitel Connect | =19.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41223 is a code injection vulnerability in Mitel MiVoice Connect, which allows an authenticated attacker to execute code within the application.
An attacker with internal network access can exploit CVE-2022-41223 by executing code within the context of the Mitel MiVoice Connect application.
Users of Mitel MiVoice Connect are affected by CVE-2022-41223.
Yes, authentication is required for an attacker to exploit CVE-2022-41223.
Mitel has released a security advisory (22-0008) with mitigation instructions for CVE-2022-41223. Please refer to their advisory for the fix.