First published: Thu Feb 06 2025(Updated: )
The Platform component of Mitel OpenScape 4000 and OpenScape 4000 Manager V11 R0.22.0 through V11 R0.22.1, V10 R1.54.0 through V10 R1.54.1, and V10 R1.42.6 and earlier could allow an unauthenticated attacker to conduct a command injection attack due to insufficient parameter sanitization. A successful exploit could allow an attacker to execute arbitrary commands within the same privilege level as the web access process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel OpenScape 4000 Manager | >=V11 R0.22.0<=V11 R0.22.1>=V10 R1.54.0<=V10 R1.54.1<=V10 R1.42.6 | |
Mitel OpenScape 4000 Manager | >=V11 R0.22.0<=V11 R0.22.1>=V10 R1.54.0<=V10 R1.54.1<=V10 R1.42.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-23094 has been classified with a high severity due to its potential for command injection attacks.
CVE-2025-23094 affects Mitel OpenScape 4000 and OpenScape 4000 Manager versions V11 R0.22.0 to V11 R0.22.1, V10 R1.54.0 to V10 R1.54.1, and V10 R1.42.6 and earlier.
To mitigate CVE-2025-23094, it is recommended to update to the latest patched versions of Mitel OpenScape 4000 or OpenScape 4000 Manager.
CVE-2025-23094 is associated with command injection attacks that can be conducted by unauthenticated attackers due to insufficient parameter sanitization.
Organizations using vulnerable versions of Mitel OpenScape 4000 and OpenScape 4000 Manager are at risk from CVE-2025-23094.