First published: Mon Aug 12 2024(Updated: )
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel 6800 | <=R6.4.0.HF1 | |
Mitel SIP Phones | <=R6.4.0.HF1 | |
Mitel SIP Phones | <=R6.4.0.HF1 | |
Mitel 6970 Conference Unit | <=R6.4.0.HF1 | |
Mitel SIP Phones | ||
All of | ||
Mitel 6970 firmware | <=6.4.0.136 | |
Mitel 6970 Conference Unit | ||
All of | ||
Mitel 6940w SIP | <=6.4.0.136 | |
Mitel 6940w SIP Firmware | ||
All of | ||
Mitel 6930w | <=6.4.0.136 | |
Mitel 6930w SIP Firmware | ||
All of | ||
Mitel 6920 SIP Firmware | <=6.4.0.136 | |
Mitel 6920w Sip Firmware | ||
All of | ||
Mitel 6920w SIP Firmware | <=6.4.0.136 | |
Mitel 6920 SIP Firmware | ||
All of | ||
Mitel 6915 SIP | <=6.4.0.136 | |
Mitel 6915 SIP | ||
All of | ||
Mitel 6910 SIP Firmware | <=6.4.0.136 | |
Mitel 6910 SIP Firmware | ||
All of | ||
Mitel 6905 SIP firmware | <=6.4.0.136 | |
Mitel 6905 SIP | ||
All of | ||
Mitel 6940 Firmware | <=6.4.0.136 | |
Mitel 6940w SIP Firmware | ||
All of | ||
Mitel MiVoice 6930 firmware | <=6.4.0.136 | |
Mitel 6930 SIP firmware | ||
All of | ||
Mitel 6873i Firmware | <=6.4.0.136 | |
Mitel 6873i Firmware | ||
All of | ||
Mitel 6869i SIP Phone | <=6.4.0.136 | |
Mitel 6869i SIP Phone | ||
All of | ||
Mitel 6867i SIP Firmware | <=6.4.0.136 | |
Mitel 6867i SIP Firmware | ||
All of | ||
Mitel 6865i SIP Firmware | <=6.4.0.136 | |
Mitel 6865i SIP firmware | ||
All of | ||
Mitel 6863 Firmware | <=6.4.0.136 | |
Mitel 6863i SIP Firmware | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
All of | ||
<=6.4.0.136 | ||
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-41710 has been rated as a high-risk vulnerability due to the potential for argument injection attacks.
To remediate CVE-2024-41710, ensure your Mitel 6800 Series, 6900 Series, or 6970 Conference Unit is updated to the latest firmware version beyond R6.4.0.HF1.
CVE-2024-41710 affects users of Mitel 6800 Series, 6900 Series, and 6970 Conference Unit SIP Phones up to version R6.4.0.HF1.
An authenticated attacker with administrative privileges could conduct an argument injection attack due to insufficient parameter sanitization.
CVE-2024-41710 impacts the Mitel 6800 Series, 6900 Series, 6900w Series SIP Phones, and the Mitel 6970 Conference Unit.