mitel mivoice-connect CVE-2022-29499 is a vulnerability in Mitel Mivoice Connect
Published on April 26, 2022

The Service Appliance component in Mitel MiVoice Connect through 19.2 SP3 allows remote code execution because of incorrect data validation. The Service Appliances are SA 100, SA 400, and Virtual SA.

Vendor Advisory NVD

Known Exploited Vulnerability

This Mitel MiVoice Connect Data Validation Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. The Service Appliance component in Mitel MiVoice Connect allows remote code execution due to incorrect data validation.

The following remediation steps are recommended / required by July 18, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2022-29499 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2022-29499

You can be notified by stack.watch whenever vulnerabilities like CVE-2022-29499 are published in these products:

 

What versions of Mivoice Connect are vulnerable to CVE-2022-29499?