First published: Thu May 02 2024(Updated: )
A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones through 6.3 SP3 HF4, 6900w Series SIP Phone through 6.3.3, and 6970 Conference Unit through 5.1.1 SP8 allows an unauthenticated attacker to conduct an authentication bypass attack due to improper authentication control. A successful exploit could allow an attacker to modify system configuration settings and potentially cause a denial of service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel 6800 | <=6.3 SP3 HF4 | |
Mitel 6900w Series SIP Phones | <=6.3.3 | |
Mitel 6970 Conference Unit | <=5.1.1 SP8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31964 is considered a critical vulnerability due to its potential for unauthorized access and control over vulnerable Mitel SIP phones.
To fix CVE-2024-31964, upgrade the affected Mitel SIP phone models to the latest firmware versions that address the authentication bypass issue.
CVE-2024-31964 affects Mitel 6800 Series SIP Phones up to version 6.3 SP3 HF4, 6900w Series SIP Phones up to version 6.3.3, and the 6970 Conference Unit up to version 5.1.1 SP8.
Yes, the authentication bypass in CVE-2024-31964 allows an unauthenticated attacker to gain unauthorized access, posing a significant security risk.
If CVE-2024-31964 is exploited, it can lead to unauthorized access and control of the compromised Mitel SIP phones, impacting communication security.