First published: Thu May 02 2024(Updated: )
A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones through 6.3 SP3 HF4, 6900w Series SIP Phone through 6.3.3, and 6970 Conference Unit through 5.1.1 SP8 allows an authenticated attacker with administrative privilege to conduct a path traversal attack due to insufficient input validation. A successful exploit could allow an attacker to access sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel 6800 | <=6.3 SP3 HF4 | |
Mitel 6900w Series SIP Phones | <=6.3.3 | |
Mitel 6970 Conference Unit | <=5.1.1 SP8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31965 is considered a high severity vulnerability due to its potential for unauthorized access and data exposure.
To fix CVE-2024-31965, update your Mitel SIP Phones and Conference Units to the latest patched versions provided by Mitel in their security advisory.
CVE-2024-31965 affects users of Mitel 6800 Series and 6900 Series SIP Phones, as well as the 6970 Conference Unit with specific version limitations.
CVE-2024-31965 allows authenticated attackers with administrative privileges to conduct a path traversal attack.
CVE-2024-31965 requires local access as it is an authenticated vulnerability.