First published: Tue Dec 10 2024(Updated: )
Mitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel MiCollab | ||
Mitel MiCollab | <9.8 | |
Mitel MiCollab | =9.8 | |
Mitel MiCollab | =9.8-sp1 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-55550 has been classified as a high severity vulnerability due to its potential to allow unauthorized access to sensitive files.
To fix CVE-2024-55550, ensure that all affected versions of Mitel MiCollab are updated to the latest release that contains the necessary security patches.
CVE-2024-55550 affects users of Mitel MiCollab versions prior to 9.8 and 9.8-sp1 that have administrative privileges.
CVE-2024-55550 is a path traversal vulnerability that arises from insufficient input sanitization in Mitel MiCollab.
The exploitation of CVE-2024-55550 requires authenticated access with administrative privileges, making it a controlled risk.