Critical Vulnerabilities in Mitel MiCollab and Lorex Camera Revealed

In a serious turn of events, security experts have unveiled a critical vulnerability in Mitel MiCollab, a unified communications solution that integrates various messaging methods such as voice, video, SMS, and chat, alongside applications like Microsoft Teams. The vulnerability, identified as CVE-2024-41713 with a CVSS score of 9.8, stems from inadequate input validation within the NuPoint Unified Messaging (NPM) component of MiCollab. The vulnerability facilitates a path traversal attack, which could lead to unauthorized file access and administrative control over affected systems.

Detailed Analysis of CVE-2024-41713

Discovery and Technical Details of the Vulnerability

The vulnerability CVE-2024-41713 was discovered by the security team at WatchTowr Labs while investigating another significant security flaw, CVE-2024-35286. This prior vulnerability permitted attackers to execute arbitrary database operations and other management actions through SQL injection. Although it was addressed in the MiCollab version 9.8 SP1 update, the ongoing analysis inadvertently led to the identification of the current vulnerability.

Primarily, the critical flaw involves the input “..;/” in an HTTP request sent to the ReconcileWizard component, enabling unauthorized access to sensitive information without the necessity of authentication. WatchTowr Labs further uncovered that this unauthorized bypass could be exploited alongside an unpatched post-authentication file read flaw. This combination allows attackers to extract sensitive data even when the system seems to be secured against such attacks.

Mitel MiCollab’s NPM component, a server-based voicemail system, provides users multiple access methods for their voice messages, including remote access and integration with Microsoft Outlook. The major functional advantage of unified messaging has now turned into a potential security liability, leading to serious concerns among cybersecurity experts.

Mitel’s Response and Security Implications

In response to CVE-2024-41713, Mitel has issued an advisory emphasizing the gravity of the threat posed by the vulnerability. If exploited, it could severely compromise the confidentiality, integrity, and availability of the affected systems. Notably, unauthorized actions performed via this exploit could potentially provide access to non-sensitive user and network information, in addition to unauthorized administrative privileges.

Although there exists a local file read flaw (CVE reserved), assigned a relatively low CVSS score of 2.7, it is limited in its scope. This flaw is confined to non-sensitive information and does not extend to file modification or privilege escalation. However, it underscores the ease with which critical vulnerabilities can sometimes be paired with lesser ones to execute more complex, damaging attacks.

Mitel has rolled out a patch for CVE-2024-41713 in MiCollab versions 9.8 SP2 and later, as of October 9, 2024. This patching not only addresses the central vulnerability but also highlights the necessity for timely and efficient updates to maintain system security over time.

Additional Security Flaws in Mitel MiCollab

SQL Injection in Audio, Web, and Video Conferencing Component

Apart from the path traversal vulnerability, Mitel MiCollab has also been found to have other significant security flaws. Notably, version 9.8 SP2 of MiCollab also addresses a critical SQL injection vulnerability in the Audio, Web, and Video Conferencing component, identified as CVE-2024-47223. This flaw possesses a CVSS score of 9.4 and represents a considerable risk to the system’s security architecture.

The SQL injection vulnerability allows for potential information disclosure and execution of arbitrary database queries by an unauthorized attacker. This discovery has further intensified the urgency for users to update their systems to the latest available versions to avoid exploitation. Given the sensitive nature of the data handled in conferencing systems, such vulnerabilities significantly heighten the potential for data breaches and unauthorized access to proprietary information.

Mitel’s swift action in addressing CVE-2024-47223, alongside CVE-2024-41713, underscores the critical importance of proactive security measures and regular updates in the field of unified communications. Nonetheless, these vulnerabilities pose a stark reminder of the persistent and evolving threats in today’s digital landscape.

Insights from Security Researchers

Prominent security researcher Sonny Macdonald has commented on the implications of these findings, shedding light on the feasibility and methodology of vulnerability research. Macdonald emphasized that investigating such vulnerabilities does not necessarily require full access to source code. Instead, detailed CVE descriptions, combined with proficient Internet search skills and a deep understanding of the underlying systems, often suffice in identifying critical security flaws.

Macdonald’s insights resonate with the broader cybersecurity community, reinforcing the necessity of clear and detailed documentation for reported vulnerabilities. This practice not only aids in the effective remediation of identified flaws but also empowers researchers and security professionals to enhance the overall security posture of the systems they oversee.

Broader Implications and Related Findings

Rapid7’s Disclosure on Lorex Security Camera Flaws

The revelations concerning Mitel MiCollab are part of a broader context of ongoing cybersecurity challenges. In parallel, Rapid7 has disclosed multiple security defects in Lorex 2K Indoor Wi-Fi Security Cameras, encompassing CVE-2024-52544 through CVE-2024-52548. This exploit chain, consisting of five distinct vulnerabilities, could potentially be combined to facilitate remote code execution on the devices.

Among these vulnerabilities, the ability to reset the admin password stands out as particularly concerning. Once the password is reset, attackers could leverage it to exploit authenticated buffer overflows and command execution, ultimately gaining root privileges. As a result, such an exploit chain represents a significant risk, emphasizing the necessity for robust cybersecurity practices in the growing field of smart home and IoT devices.

The intersection of vulnerabilities in both enterprise and consumer technology underscores the broad and pervasive nature of cybersecurity threats today. It highlights the importance of a comprehensive approach to security, encompassing timely updates, stringent input validation, and continuous monitoring for emerging threats.

Call to Action for Enhanced Security Measures

In a concerning development, cybersecurity experts have identified a critical vulnerability in Mitel MiCollab, an advanced unified communications platform that incorporates a range of messaging methods, including voice, video, SMS, and chat, along with integrations to applications like Microsoft Teams. The flaw, designated as CVE-2024-41713 and carrying a high Common Vulnerability Scoring System (CVSS) rating of 9.8, arises from insufficient input validation within MiCollab’s NuPoint Unified Messaging (NPM) component. This vulnerability enables a path traversal attack, a technique that allows malicious actors to gain unauthorized access to files and potentially obtain administrative control over the compromised systems. With a CVSS score of 9.8, this vulnerability is classified as severe and requires immediate attention to prevent exploitation and protect sensitive data within affected systems. Users and administrators are strongly advised to apply security patches and follow mitigation strategies recommended by Mitel to secure their systems against potential breaches.

Explore more

How Will Embedded Finance Reshape Procurement and Supply?

In boardrooms that once debated unit costs and lead times, a new variable now determines advantage: the ability to move money, data, and decisions in one continuous motion across procurement and supply operations, and that shift is redefining benchmarks for visibility, control, and supplier resilience. Organizations that embed payments and financing directly into purchasing workflows are reporting meaningfully better results—stronger

What Should Your 2025 Email Marketing Audit Include?

Tailor Jackson sat down with Aisha Amaira, a MarTech expert known for marrying CRM systems, customer data platforms, and marketing automation into revenue-ready programs. Aisha approaches email audits like a mechanic approaches a high-mileage engine: measure, isolate, and fix what slows performance—then document everything so it scales. In this conversation, she unpacks a full-system approach to email marketing audits: technical

Can Precision and Trust Fix Tech’s B2B Email Performance?

The B2B Email Landscape in Tech: Scale, Stakeholders, and Significance Inboxes felt endless long before today’s flood, yet email still directs how tech buyers move from discovery to shortlist and, ultimately, to pipeline-worthy conversations. It remains the most trusted direct channel for B2B, particularly in SaaS, cybersecurity, infrastructure, DevOps, and AI/ML, where complex decisions demand a steady cadence of proof,

Noctua Unveils Premium NH-D15 G2 Chromax.Black Cooler

Diving into the world of high-performance PC cooling, we’re thrilled to sit down with Dominic Jainy, an IT professional whose deep knowledge of cutting-edge hardware and innovative technologies makes him the perfect guide to unpack Noctua’s latest release. With a career spanning artificial intelligence, machine learning, and blockchain, Dominic brings a unique perspective to how hardware like CPU coolers impacts

How Is Monzo Redefining Digital Banking with 14M Users?

In an era where digital solutions dominate financial landscapes, Monzo has emerged as a powerhouse, boasting an impressive 14 million users worldwide. This staggering figure, achieved with a record 2 million new customers in just six months by September of this year, raises a pressing question: what makes this UK-based digital bank stand out in a crowded FinTech market? To