First published: Thu Sep 14 2023(Updated: )
A vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 SP3 (22.24.5800.0) could allow an unauthenticated attacker to perform a Cross Site Request Forgery (CSRF) attack due to insufficient request validation. A successful exploit could allow an attacker to provide a modified URL, potentially enabling them to modify system configuration settings.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel MiVoice Connect | <22.24.7100.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39285 is a vulnerability in the Edge Gateway component of Mitel MiVoice Connect through 19.3 SP3 (22.24.5800.0) that could allow an unauthenticated attacker to perform a Cross Site Request Forgery (CSRF) attack due to insufficient request validation.
CVE-2023-39285 could allow an attacker to perform a CSRF attack on Mitel MiVoice Connect, potentially leading to unauthorized modifications or actions.
CVE-2023-39285 has a severity rating of medium with a CVSS score of 4.3.
You can check if your Mitel MiVoice Connect is affected by CVE-2023-39285 by verifying the software version is through 19.3 SP3 (22.24.5800.0) or earlier.
Yes, Mitel has released a security advisory (23-0014) with mitigation steps to address CVE-2023-39285. Please refer to the advisory for more information.