CVE-2020-35547

9.1 CRITICAL

📋 TL;DR

This vulnerability in Mitel MiCollab's NuPoint Messenger allows unauthenticated attackers to view and modify user data through a library index page. It affects organizations using MiCollab versions before 9.2 FP1. The high CVSS score of 9.1 indicates critical severity with significant data exposure risk.

💻 Affected Systems

Products:
  • Mitel MiCollab with NuPoint Messenger
Versions: All versions before 9.2 FP1
Operating Systems: Various (product-specific)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the library index page component specifically; requires NuPoint Messenger functionality to be enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user data including sensitive communications, credentials, and personal information leading to data breaches, identity theft, and system takeover.

🟠

Likely Case

Unauthorized access to user messages, contact lists, and configuration data enabling information gathering for further attacks or data exfiltration.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation, though internal threats remain.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description suggests straightforward exploitation via the library index page without authentication requirements.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.2 FP1 and later

Vendor Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0016

Restart Required: Yes

Instructions:

1. Download MiCollab 9.2 FP1 or later from Mitel support portal. 2. Backup current configuration and data. 3. Apply the update following Mitel's installation guide. 4. Restart services as required. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to MiCollab/NuPoint Messenger interfaces to trusted networks only

Use firewall rules to limit access to MiCollab ports (typically 80/443 and application-specific ports)

Disable Unnecessary Features

all

Temporarily disable NuPoint Messenger functionality if not essential

Consult Mitel documentation for feature disablement procedures specific to your deployment

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MiCollab systems from untrusted networks
  • Deploy web application firewall (WAF) rules to block access to library index page paths

🔍 How to Verify

Check if Vulnerable:

Check MiCollab version via admin interface or system logs; versions below 9.2 FP1 are vulnerable

Check Version:

Check admin console or system configuration files for version information (varies by deployment)

Verify Fix Applied:

Confirm version is 9.2 FP1 or later and test that unauthenticated access to library index pages is blocked

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access attempts to library/index paths
  • Unusual data access patterns from unexpected IP addresses

Network Indicators:

  • HTTP requests to library endpoints without authentication headers
  • Traffic spikes to MiCollab web interfaces

SIEM Query:

source="micollab" AND (url="*library*" OR url="*index*") AND auth_status="failed"

🔗 References

📤 Share & Export