First published: Thu May 02 2024(Updated: )
A vulnerability on Mitel 6800 Series and 6900 Series SIP Phones through 6.3 SP3 HF4, 6900w Series SIP Phone through 6.3.3, and 6970 Conference Unit through 5.1.1 SP8 allows an authenticated attacker with administrative privilege to conduct an argument injection attack due to insufficient parameter sanitization. A successful exploit could allow an attacker to access sensitive information, modify system configuration or execute arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel 6800 | <=6.3 SP3 HF4 | |
Mitel 6900w Series SIP Phones | <=6.3.3 | |
Mitel 6970 Conference Unit | <=5.1.1 SP8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The affected devices include Mitel 6800 Series SIP Phones up to version 6.3 SP3 HF4, 6900 Series SIP Phones up to version 6.3.3, and 6970 Conference Unit up to version 5.1.1 SP8.
CVE-2024-31966 involves an argument injection attack that can be exploited by authenticated attackers with administrative privileges.
The risk level for CVE-2024-31966 is considered high due to the potential for unauthorized access and manipulation of phone settings.
Remediation for CVE-2024-31966 involves updating the affected Mitel devices to the latest firmware versions as per the vendor's guidance.
As of now, there are no publicly available exploit details specifically documented for CVE-2024-31966.