First published: Thu May 02 2024(Updated: )
A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones through 6.3 SP3 HF4, 6900w Series SIP Phone through 6.3.3, and 6970 Conference Unit through 5.1.1 SP8 allows an authenticated attacker to conduct a buffer overflow attack due to insufficient bounds checking and input sanitization. A successful exploit could allow an attacker to gain access to sensitive information, modify system configuration or execute arbitrary commands within the context of the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel 6800 | <=6.3 SP3 HF4 | |
Mitel 6900w Series SIP Phones | <=6.3.3 | |
Mitel 6970 Conference Unit | <=5.1.1 SP8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31963 has been assessed to have a high severity level due to the potential impact of a buffer overflow attack.
To mitigate CVE-2024-31963, update the Mitel 6800 Series SIP Phones, 6900 Series SIP Phones, or 6970 Conference Unit to the latest software version that addresses this vulnerability.
CVE-2024-31963 affects Mitel 6800 Series SIP Phones up to 6.3 SP3 HF4, 6900 Series SIP Phones up to 6.3.3, and the 6970 Conference Unit up to 5.1.1 SP8.
An authenticated attacker can conduct a buffer overflow attack on affected Mitel devices due to insufficient bounds checking and input sanitization.
Yes, CVE-2024-31963 requires the attacker to be authenticated to exploit the vulnerability.