First published: Wed May 24 2023(Updated: )
A vulnerability in the Edge Gateway component of Mitel MiVoice Connect versions 19.3 SP2 (22.24.1500.0) and earlier could allow an unauthenticated attacker with internal network access to authenticate with administrative privileges, because initial installation does not enforce a password change. A successful exploit could allow an attacker to make arbitrary configuration changes and execute arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel MiVoice Connect | <=22.24.1500.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31458 is a vulnerability in the Edge Gateway component of Mitel MiVoice Connect versions 19.3 SP2 (22.24.1500.0) and earlier that could allow an unauthenticated attacker with internal network access to authenticate with administrative privileges.
CVE-2023-31458 has a severity level of 9 (critical).
An attacker can exploit CVE-2023-31458 by leveraging internal network access to authenticate with administrative privileges without requiring a password change during initial installation.
CVE-2023-31458 affects Mitel MiVoice Connect versions 19.3 SP2 (22.24.1500.0) and earlier.
To mitigate CVE-2023-31458, users should ensure that a password change is enforced during initial installation of Mitel MiVoice Connect and limit internal network access to prevent unauthenticated attackers from exploiting the vulnerability.