First published: Mon Oct 21 2024(Updated: )
A vulnerability in the AWV (Audio, Web and Video Conferencing) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access non-sensitive user provisioning information and execute arbitrary SQL database commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel MiCollab | <=9.8.1.201 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47223 is rated as critical due to the potential for unauthenticated SQL injection attacks that can compromise sensitive data.
To fix CVE-2024-47223, update your Mitel MiCollab software to version 9.8 SP1 FP3 or later.
CVE-2024-47223 affects users of Mitel MiCollab versions up to and including 9.8 SP1 FP2 (9.8.1.201).
CVE-2024-47223 is associated with a SQL injection attack that exploits insufficient input sanitization.
Yes, an unauthenticated attacker can exploit CVE-2024-47223 remotely due to the nature of SQL injection.