First published: Mon Aug 12 2024(Updated: )
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel 6800 | <=R6.4.0.HF1 | |
Mitel 6900w Series SIP Phones | <=R6.4.0.HF1 | |
Mitel 6900 Series SIP Phones | <=R6.4.0.HF1 | |
Mitel 6970 Conference Unit | <=R6.4.0.HF1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-41710 has been rated as a high-risk vulnerability due to the potential for argument injection attacks.
To remediate CVE-2024-41710, ensure your Mitel 6800 Series, 6900 Series, or 6970 Conference Unit is updated to the latest firmware version beyond R6.4.0.HF1.
CVE-2024-41710 affects users of Mitel 6800 Series, 6900 Series, and 6970 Conference Unit SIP Phones up to version R6.4.0.HF1.
An authenticated attacker with administrative privileges could conduct an argument injection attack due to insufficient parameter sanitization.
CVE-2024-41710 impacts the Mitel 6800 Series, 6900 Series, 6900w Series SIP Phones, and the Mitel 6970 Conference Unit.