First published: Mon Oct 21 2024(Updated: )
A vulnerability in the AWV (Audio, Web and Video Conferencing) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a CRLF injection attack due to inadequate encoding of user input in URLs. A successful exploit could allow an attacker to perform a phishing attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel MiCollab | <=9.8 SP1 FP2 (9.8.1.201) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47224 is considered a high severity vulnerability due to the potential for unauthenticated attackers to execute CRLF injection attacks.
To fix CVE-2024-47224, upgrade the Mitel MiCollab software to a version beyond 9.8 SP1 FP2 (9.8.1.201), where the vulnerability is addressed.
CVE-2024-47224 can enable an attacker to perform CRLF injection attacks, which can lead to various malicious activities.
CVE-2024-47224 affects users of Mitel MiCollab versions up to and including 9.8 SP1 FP2 (9.8.1.201).
Yes, CVE-2024-47224 can be exploited remotely by unauthenticated attackers, making it critical to address.