Micollab Mitel Micollab

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Mitel Micollab.

Known Exploited Mitel Micollab Vulnerabilities

The following Mitel Micollab vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
Mitel MiCollab Path Traversal Vulnerability Mitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server.
CVE-2024-55550 Exploit Probability: 15.0%
January 7, 2025
Mitel MiCollab Path Traversal Vulnerability Mitel MiCollab contains a path traversal vulnerability that could allow an attacker to gain unauthorized and unauthenticated access. This vulnerability can be chained with CVE-2024-55550, which allows an unauthenticated, remote attacker to read arbitrary files on the server.
CVE-2024-41713 Exploit Probability: 93.9%
January 7, 2025

The vulnerability CVE-2024-41713: Mitel MiCollab Path Traversal Vulnerability is in the top 1% of the currently known exploitable vulnerabilities.

By the Year

In 2025 there have been 0 vulnerabilities in Mitel Micollab. Last year, in 2024 Micollab had 6 security vulnerabilities published. Right now, Micollab is on track to have less security vulnerabilities in 2025 than it did last year.




Year Vulnerabilities Average Score
2025 0 0.00
2024 6 5.97
2023 1 5.90
2022 6 8.92
2021 9 6.49
2020 8 5.90
2019 2 7.55
2018 1 5.50

It may take a day or so for new Micollab vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Mitel Micollab Security Vulnerabilities

Mitel MiCollab Insufficient Input Sanitization Local File Read Vulnerability

CVE-2024-55550 2.7 - Low - December 10, 2024

Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.

Directory traversal

A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could

CVE-2024-41713 9.1 - Critical - October 21, 2024

A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations.

Directory traversal

A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could

CVE-2024-30157 7.2 - High - October 21, 2024

A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a SQL Injection attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary database and management operations.

SQL Injection

A vulnerability in the web conferencing component of Mitel MiCollab through 9.7.1.110 could

CVE-2024-30158 7.2 - High - October 21, 2024

A vulnerability in the web conferencing component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a SQL Injection attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary database and management operations.

SQL Injection

A vulnerability in the web conferencing component of Mitel MiCollab through 9.7.1.110 could

CVE-2024-30159 4.8 - Medium - October 21, 2024

A vulnerability in the web conferencing component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a Stored Cross-Site Scripting (XSS) attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary scripts.

XSS

A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could

CVE-2024-30160 4.8 - Medium - October 21, 2024

A vulnerability in the Suite Applications Services component of Mitel MiCollab through 9.7.1.110 could allow an authenticated attacker with administrative privileges to conduct a Stored Cross-Site Scripting (XSS) attack due to insufficient validation of user input. A successful exploit could allow an attacker to execute arbitrary scripts.

XSS

A vulnerability in the web conferencing component of Mitel MiCollab through 9.6.2.9 could

CVE-2023-25597 5.9 - Medium - April 14, 2023

A vulnerability in the web conferencing component of Mitel MiCollab through 9.6.2.9 could allow an unauthenticated attacker to download a shared file via a crafted request - including the exact path and filename - due to improper authentication control. A successful exploit could allow access to sensitive information.

authentification

The web conferencing component of Mitel MiCollab through 9.6.0.13 could

CVE-2022-41326 9.8 - Critical - November 22, 2022

The web conferencing component of Mitel MiCollab through 9.6.0.13 could allow an unauthenticated attacker to upload arbitrary scripts due to improper authorization controls. A successful exploit could allow remote code execution within the context of the application.

A vulnerability in the web conferencing component of Mitel MiCollab through 9.5.0.101 could

CVE-2022-36452 9.8 - Critical - October 25, 2022

A vulnerability in the web conferencing component of Mitel MiCollab through 9.5.0.101 could allow an unauthenticated attacker to upload malicious files. A successful exploit could allow an attacker to execute arbitrary code within the context of the application.

Unrestricted File Upload

A vulnerability in the MiCollab Client server component of Mitel MiCollab through 9.5.0.101 could

CVE-2022-36451 8.8 - High - October 25, 2022

A vulnerability in the MiCollab Client server component of Mitel MiCollab through 9.5.0.101 could allow an authenticated attacker to conduct a Server-Side Request Forgery (SSRF) attack due to insufficient restriction of URL parameters. A successful exploit could allow an attacker to leverage connections and permissions available to the host server.

SSRF

A vulnerability in the MiCollab Client API of Mitel MiCollab 9.1.3 through 9.5.0.101 could

CVE-2022-36453 8.8 - High - October 25, 2022

A vulnerability in the MiCollab Client API of Mitel MiCollab 9.1.3 through 9.5.0.101 could allow an authenticated attacker to modify their profile parameters due to improper authorization controls. A successful exploit could allow the authenticated attacker to control another extension number.

A vulnerability in the MiCollab Client API of Mitel MiCollab through 9.5.0.101 could

CVE-2022-36454 6.5 - Medium - October 25, 2022

A vulnerability in the MiCollab Client API of Mitel MiCollab through 9.5.0.101 could allow an authenticated attacker to modify their profile parameters due to improper authorization controls. A successful exploit could allow the authenticated attacker to impersonate another user's name.

The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information

CVE-2022-26143 9.8 - Critical - March 10, 2022

The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.

Missing Authentication for Critical Function

The MiCollab Client Service component in Mitel MiCollab before 9.3 could

CVE-2021-32067 6.5 - Medium - August 13, 2021

The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to view sensitive system information through an HTTP response due to insufficient output sanitization.

Output Sanitization

The MiCollab Client Service component in Mitel MiCollab before 9.3 could

CVE-2021-32072 6.5 - Medium - August 13, 2021

The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to get source code information (disclosing sensitive application data) due to insufficient output sanitization. A successful exploit could allow an attacker to view source code methods.

Output Sanitization

The Join Meeting page of Mitel MiCollab Web Client before 9.2 FP2 could

CVE-2021-27401 6.1 - Medium - August 13, 2021

The Join Meeting page of Mitel MiCollab Web Client before 9.2 FP2 could allow an attacker to access (view and modify) user data by executing arbitrary code due to insufficient input validation, aka Cross-Site Scripting (XSS).

XSS

The SAS Admin portal of Mitel MiCollab before 9.2 FP2 could

CVE-2021-27402 6.5 - Medium - August 13, 2021

The SAS Admin portal of Mitel MiCollab before 9.2 FP2 could allow an unauthenticated attacker to access (view and modify) user data by injecting arbitrary directory paths due to improper URL validation, aka Directory Traversal.

Directory traversal

The AWV and MiCollab Client Service components in Mitel MiCollab before 9.3 could

CVE-2021-32068 3.7 - Low - August 13, 2021

The AWV and MiCollab Client Service components in Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack by sending multiple session renegotiation requests, due to insufficient TLS session controls. A successful exploit could allow an attacker to modify application data and state.

Allocation of Resources Without Limits or Throttling

The AWV component of Mitel MiCollab before 9.3 could

CVE-2021-32069 4.8 - Medium - August 13, 2021

The AWV component of Mitel MiCollab before 9.3 could allow an attacker to perform a Man-In-the-Middle attack due to improper TLS negotiation. A successful exploit could allow an attacker to view and modify data.

Improper Certificate Validation

The MiCollab Client Service component in Mitel MiCollab before 9.3 could

CVE-2021-32070 5.4 - Medium - August 13, 2021

The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to perform a clickjacking attack due to an insecure header response. A successful exploit could allow an attacker to modify the browser header and redirect users.

Clickjacking

The MiCollab Client service in Mitel MiCollab before 9.3 could

CVE-2021-32071 9.8 - Critical - August 13, 2021

The MiCollab Client service in Mitel MiCollab before 9.3 could allow an unauthenticated user to gain system access due to improper access control. A successful exploit could allow an attacker to view and modify application data, and cause a denial of service for users.

A library index page in NuPoint Messenger in Mitel MiCollab before 9.2 FP1 could

CVE-2020-35547 9.1 - Critical - January 29, 2021

A library index page in NuPoint Messenger in Mitel MiCollab before 9.2 FP1 could allow an unauthenticated attacker to gain access (view and modify) to user data.

AuthZ

The AWV portal of Mitel MiCollab before 9.2 could

CVE-2020-25611 6.1 - Medium - December 18, 2020

The AWV portal of Mitel MiCollab before 9.2 could allow an attacker to gain access to conference information by sending arbitrary code due to improper input validation, aka XSS. Successful exploitation could allow an attacker to view user conference information.

XSS

The AWV component of Mitel MiCollab before 9.2 could

CVE-2020-25606 6.1 - Medium - December 18, 2020

The AWV component of Mitel MiCollab before 9.2 could allow an attacker to view system information by sending arbitrary code due to improper input validation, aka XSS.

XSS

The SAS portal of Mitel MiCollab before 9.2 could

CVE-2020-25608 7.2 - High - December 18, 2020

The SAS portal of Mitel MiCollab before 9.2 could allow an attacker to access user credentials due to improper input validation, aka SQL Injection.

SQL Injection

The NuPoint Messenger Portal of Mitel MiCollab before 9.2 could

CVE-2020-25609 5.4 - Medium - December 18, 2020

The NuPoint Messenger Portal of Mitel MiCollab before 9.2 could allow an authenticated attacker to execute arbitrary scripts due to insufficient input validation, aka XSS. A successful exploit could allow an attacker to view and modify user data.

XSS

The AWV component of Mitel MiCollab before 9.2 could

CVE-2020-25610 5.3 - Medium - December 18, 2020

The AWV component of Mitel MiCollab before 9.2 could allow an attacker to gain access to a web conference due to insufficient access control for conference codes.

AuthZ

The NuPoint Messenger of Mitel MiCollab before 9.2 could

CVE-2020-25612 4.9 - Medium - December 18, 2020

The NuPoint Messenger of Mitel MiCollab before 9.2 could allow an attacker with escalated privilege to access user files due to insufficient access control. Successful exploit could potentially allow an attacker to gain access to sensitive information.

AuthZ

The online help portal of Mitel MiCollab before 9.2 could

CVE-2020-27340 6.1 - Medium - December 18, 2020

The online help portal of Mitel MiCollab before 9.2 could allow an attacker to redirect a user to an unauthorized website by executing malicious script due to insufficient access control.

Open Redirect

A cross-site scripting (XSS) vulnerability in the web conferencing component of the Mitel MiCollab application before 9.0.15 for Android could

CVE-2019-19370 6.1 - Medium - March 02, 2020

A cross-site scripting (XSS) vulnerability in the web conferencing component of the Mitel MiCollab application before 9.0.15 for Android could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation in the file upload interface. A successful exploit could allow an attacker to execute arbitrary scripts.

XSS

A vulnerability in the web conference chat component of MiCollab, versions 7.3 PR6 (7.3.0.601) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP2 (8.0.2.202), and MiVoice Business Express versions 7.3 PR3 (7.3.1.302) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP1 (8.0.2.202), could

CVE-2018-18819 5.3 - Medium - November 12, 2019

A vulnerability in the web conference chat component of MiCollab, versions 7.3 PR6 (7.3.0.601) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP2 (8.0.2.202), and MiVoice Business Express versions 7.3 PR3 (7.3.1.302) and earlier, and 8.0 (8.0.0.40) through 8.0 SP2 FP1 (8.0.2.202), could allow creation of unauthorized chat sessions, due to insufficient access controls. A successful exploit could allow execution of arbitrary commands.

AuthZ

MiCollab 7.3 PR2 (7.3.0.204) and earlier

CVE-2019-12165 9.8 - Critical - May 29, 2019

MiCollab 7.3 PR2 (7.3.0.204) and earlier, 7.2 (7.2.2.13) and earlier, and 7.1 (7.1.0.57) and earlier and MiCollab AWV 6.3 (6.3.0.103), 6.2 (6.2.2.8), 6.1 (6.1.0.28), 6.0 (6.0.0.61), and 5.0 (5.0.5.7) have a Command Execution Vulnerability. Successful exploit of this vulnerability could allow an attacker to execute arbitrary system commands.

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may

CVE-2018-3639 5.5 - Medium - May 22, 2018

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

Side Channel Attack

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets

CVE-2014-0160 7.5 - High - April 07, 2014

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Out-of-bounds Read

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Splunk or by Mitel? Click the Watch button to subscribe.

Mitel
Vendor

subscribe