CISA KEV 정보
| 취약점명 | Mitel MiCollab Path Traversal Vulnerability |
|---|---|
| 설명 | Mitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server. |
| 조치사항 | Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Known |
| CWE | CWE-22 |
| 등록일 (KEV) | 2025-01-07 |
| 조치 기한 | 2025-01-28 |
| 추가 참고 | https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55550 |
NVD 상세 정보
CVSS v3.1: 2.7 LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N설명: Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
CWE: CWE-22 | CWE-22
참조
- https://www.mitel.com/support/security-advisories [Vendor Advisory]
- https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 [Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-55550 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.