Critical Vulnerabilities in Mitel MiCollab and Lorex Camera Revealed

In a serious turn of events, security experts have unveiled a critical vulnerability in Mitel MiCollab, a unified communications solution that integrates various messaging methods such as voice, video, SMS, and chat, alongside applications like Microsoft Teams. The vulnerability, identified as CVE-2024-41713 with a CVSS score of 9.8, stems from inadequate input validation within the NuPoint Unified Messaging (NPM) component of MiCollab. The vulnerability facilitates a path traversal attack, which could lead to unauthorized file access and administrative control over affected systems.

Detailed Analysis of CVE-2024-41713

Discovery and Technical Details of the Vulnerability

The vulnerability CVE-2024-41713 was discovered by the security team at WatchTowr Labs while investigating another significant security flaw, CVE-2024-35286. This prior vulnerability permitted attackers to execute arbitrary database operations and other management actions through SQL injection. Although it was addressed in the MiCollab version 9.8 SP1 update, the ongoing analysis inadvertently led to the identification of the current vulnerability.

Primarily, the critical flaw involves the input “..;/” in an HTTP request sent to the ReconcileWizard component, enabling unauthorized access to sensitive information without the necessity of authentication. WatchTowr Labs further uncovered that this unauthorized bypass could be exploited alongside an unpatched post-authentication file read flaw. This combination allows attackers to extract sensitive data even when the system seems to be secured against such attacks.

Mitel MiCollab’s NPM component, a server-based voicemail system, provides users multiple access methods for their voice messages, including remote access and integration with Microsoft Outlook. The major functional advantage of unified messaging has now turned into a potential security liability, leading to serious concerns among cybersecurity experts.

Mitel’s Response and Security Implications

In response to CVE-2024-41713, Mitel has issued an advisory emphasizing the gravity of the threat posed by the vulnerability. If exploited, it could severely compromise the confidentiality, integrity, and availability of the affected systems. Notably, unauthorized actions performed via this exploit could potentially provide access to non-sensitive user and network information, in addition to unauthorized administrative privileges.

Although there exists a local file read flaw (CVE reserved), assigned a relatively low CVSS score of 2.7, it is limited in its scope. This flaw is confined to non-sensitive information and does not extend to file modification or privilege escalation. However, it underscores the ease with which critical vulnerabilities can sometimes be paired with lesser ones to execute more complex, damaging attacks.

Mitel has rolled out a patch for CVE-2024-41713 in MiCollab versions 9.8 SP2 and later, as of October 9, 2024. This patching not only addresses the central vulnerability but also highlights the necessity for timely and efficient updates to maintain system security over time.

Additional Security Flaws in Mitel MiCollab

SQL Injection in Audio, Web, and Video Conferencing Component

Apart from the path traversal vulnerability, Mitel MiCollab has also been found to have other significant security flaws. Notably, version 9.8 SP2 of MiCollab also addresses a critical SQL injection vulnerability in the Audio, Web, and Video Conferencing component, identified as CVE-2024-47223. This flaw possesses a CVSS score of 9.4 and represents a considerable risk to the system’s security architecture.

The SQL injection vulnerability allows for potential information disclosure and execution of arbitrary database queries by an unauthorized attacker. This discovery has further intensified the urgency for users to update their systems to the latest available versions to avoid exploitation. Given the sensitive nature of the data handled in conferencing systems, such vulnerabilities significantly heighten the potential for data breaches and unauthorized access to proprietary information.

Mitel’s swift action in addressing CVE-2024-47223, alongside CVE-2024-41713, underscores the critical importance of proactive security measures and regular updates in the field of unified communications. Nonetheless, these vulnerabilities pose a stark reminder of the persistent and evolving threats in today’s digital landscape.

Insights from Security Researchers

Prominent security researcher Sonny Macdonald has commented on the implications of these findings, shedding light on the feasibility and methodology of vulnerability research. Macdonald emphasized that investigating such vulnerabilities does not necessarily require full access to source code. Instead, detailed CVE descriptions, combined with proficient Internet search skills and a deep understanding of the underlying systems, often suffice in identifying critical security flaws.

Macdonald’s insights resonate with the broader cybersecurity community, reinforcing the necessity of clear and detailed documentation for reported vulnerabilities. This practice not only aids in the effective remediation of identified flaws but also empowers researchers and security professionals to enhance the overall security posture of the systems they oversee.

Broader Implications and Related Findings

Rapid7’s Disclosure on Lorex Security Camera Flaws

The revelations concerning Mitel MiCollab are part of a broader context of ongoing cybersecurity challenges. In parallel, Rapid7 has disclosed multiple security defects in Lorex 2K Indoor Wi-Fi Security Cameras, encompassing CVE-2024-52544 through CVE-2024-52548. This exploit chain, consisting of five distinct vulnerabilities, could potentially be combined to facilitate remote code execution on the devices.

Among these vulnerabilities, the ability to reset the admin password stands out as particularly concerning. Once the password is reset, attackers could leverage it to exploit authenticated buffer overflows and command execution, ultimately gaining root privileges. As a result, such an exploit chain represents a significant risk, emphasizing the necessity for robust cybersecurity practices in the growing field of smart home and IoT devices.

The intersection of vulnerabilities in both enterprise and consumer technology underscores the broad and pervasive nature of cybersecurity threats today. It highlights the importance of a comprehensive approach to security, encompassing timely updates, stringent input validation, and continuous monitoring for emerging threats.

Call to Action for Enhanced Security Measures

In a concerning development, cybersecurity experts have identified a critical vulnerability in Mitel MiCollab, an advanced unified communications platform that incorporates a range of messaging methods, including voice, video, SMS, and chat, along with integrations to applications like Microsoft Teams. The flaw, designated as CVE-2024-41713 and carrying a high Common Vulnerability Scoring System (CVSS) rating of 9.8, arises from insufficient input validation within MiCollab’s NuPoint Unified Messaging (NPM) component. This vulnerability enables a path traversal attack, a technique that allows malicious actors to gain unauthorized access to files and potentially obtain administrative control over the compromised systems. With a CVSS score of 9.8, this vulnerability is classified as severe and requires immediate attention to prevent exploitation and protect sensitive data within affected systems. Users and administrators are strongly advised to apply security patches and follow mitigation strategies recommended by Mitel to secure their systems against potential breaches.

Explore more