First published: Wed May 24 2023(Updated: )
A vulnerability in the Connect Mobility Router component of Mitel MiVoice Connect versions 9.6.2208.101 and earlier could allow an unauthenticated attacker with internal network access to authenticate with administrative privileges, because the initial installation does not enforce a password change. A successful exploit could allow an attacker to make arbitrary configuration changes and execute arbitrary commands.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel MiVoice Connect | <=9.6.2208.101 | |
<=9.6.2208.101 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-31459.
CVE-2023-31459 has a severity rating of 8.8 (high).
The affected software for CVE-2023-31459 is Mitel MiVoice Connect versions 9.6.2208.101 and earlier.
An unauthenticated attacker with internal network access can exploit CVE-2023-31459 by authenticating with administrative privileges without having to change the initial installation password.
More information about CVE-2023-31459 can be found on the Mitel Product Security Advisories page: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0006