CVE-2018-19275

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to gain unauthorized access to Mitel InAttend and CMG Suite Servers due to a default password in the BluStar component. Attackers can execute arbitrary scripts, potentially compromising confidentiality, integrity, and availability. Organizations using affected versions of these Mitel products are at risk.

💻 Affected Systems

Products:
  • Mitel InAttend
  • Mitel CMG Suite Servers
Versions: InAttend before 2.5 SP3, CMG before 8.4 SP3
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the BluStar component with default credentials.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal sensitive data, disrupt operations, and pivot to other network systems.

🟠

Likely Case

Unauthorized access leading to data exfiltration, configuration changes, or service disruption through script execution.

🟢

If Mitigated

Limited impact if systems are isolated, monitored, and have strong network controls preventing external access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Default password vulnerabilities are trivial to exploit with basic scanning tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: InAttend 2.5 SP3, CMG 8.4 SP3

Vendor Advisory: https://www.mitel.com/en-gb/support/security-advisories/mitel-product-security-advisory-19-0002

Restart Required: Yes

Instructions:

1. Download patches from Mitel support portal. 2. Apply InAttend 2.5 SP3 or CMG 8.4 SP3. 3. Restart affected servers. 4. Change default passwords after patching.

🔧 Temporary Workarounds

Change Default Password

all

Immediately change the default BluStar component password to a strong, unique credential.

Use Mitel administration interface to change BluStar component password

Network Isolation

all

Restrict network access to affected servers using firewalls or network segmentation.

Configure firewall rules to limit access to trusted IPs only

🧯 If You Can't Patch

  • Isolate affected systems from internet and untrusted networks
  • Implement strict network monitoring and alerting for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check system version in Mitel administration interface: InAttend versions before 2.5 SP3 or CMG versions before 8.4 SP3 are vulnerable.

Check Version:

Use Mitel administration console to view system version information

Verify Fix Applied:

Confirm version shows InAttend 2.5 SP3 or CMG 8.4 SP3 in administration interface and test that default password no longer works.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Unauthorized script execution events
  • Changes to BluStar component configuration

Network Indicators:

  • Unexpected remote connections to BluStar service ports
  • Traffic patterns indicating credential brute-forcing

SIEM Query:

source="mitel_server" AND (event_type="authentication" AND result="success" AND user="default") OR (process_execution AND parent_process="blustar")

🔗 References

📤 Share & Export