First published: Tue Aug 13 2024(Updated: )
A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an unauthenticated attacker with physical access to the phone to conduct an argument injection attack, due to insufficient parameter sanitization. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel 6800 | <=R6.4.0.HF1 | |
Mitel 6900w Series SIP Phones | <=R6.4.0.HF1 | |
Mitel 6900 Series SIP Phones | <=R6.4.0.HF1 | |
Mitel 6970 Conference Unit | <=R6.4.0.HF1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41711 has been classified as a high-severity vulnerability due to the potential for unauthorized access and argument injection attacks.
To fix CVE-2024-41711, update the affected Mitel SIP Phones to firmware version R6.4.0.HF2 or later.
CVE-2024-41711 affects Mitel 6800 Series SIP Phones, 6900 Series SIP Phones, 6900w Series SIP Phones, and the 6970 Conference Unit.
No, CVE-2024-41711 requires physical access to the affected devices for exploitation.
CVE-2024-41711 allows an unauthenticated attacker to conduct an argument injection attack due to insufficient parameter sanitization.