CVE-2023-39293

9.8 CRITICAL

📋 TL;DR

This critical command injection vulnerability in MiVoice Office 400 SMB Controller allows attackers to execute arbitrary system commands with the privileges of the application. Affected organizations using vulnerable versions of this telephony controller are at risk of complete system compromise.

💻 Affected Systems

Products:
  • MiVoice Office 400 SMB Controller
Versions: through 1.2.5.23
Operating Systems: Embedded/Linux-based
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to install malware, exfiltrate data, pivot to other systems, or disrupt telephony services.

🟠

Likely Case

Remote code execution leading to data theft, service disruption, or ransomware deployment.

🟢

If Mitigated

Limited impact if system is isolated, patched, or has strict network controls preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates trivial exploitation without authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.2.5.23

Vendor Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0009

Restart Required: Yes

Instructions:

1. Download latest firmware from Mitel support portal. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart system. 5. Verify version is updated.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to controller to only necessary management interfaces

Firewall Rules

all

Block all external access to controller management interfaces

🧯 If You Can't Patch

  • Isolate system on separate VLAN with strict firewall rules
  • Implement network monitoring for suspicious command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check controller web interface or CLI for version number

Check Version:

Check web interface System Information page or vendor-specific CLI commands

Verify Fix Applied:

Verify version is greater than 1.2.5.23

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Unexpected system process creation
  • Authentication bypass attempts

Network Indicators:

  • Suspicious HTTP requests to controller endpoints
  • Unexpected outbound connections from controller

SIEM Query:

source="mivoice-controller" AND (event_type="command_execution" OR process_name="unusual")

🔗 References

📤 Share & Export