CVE-2024-28815

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Mitel InAttend and CMG systems allows attackers to access sensitive information, modify system configurations, or execute arbitrary commands with system privileges. It affects Mitel InAttend 2.6 SP4 through 2.7 and CMG 8.5 SP4 through 8.6. Organizations using these versions are at immediate risk.

💻 Affected Systems

Products:
  • Mitel InAttend
  • Mitel CMG
Versions: InAttend 2.6 SP4 through 2.7, CMG 8.5 SP4 through 8.6
Operating Systems: Windows-based systems running Mitel software
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the BluStar component specifically. All installations within the affected version ranges are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with system privileges, steal sensitive data, modify configurations, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to sensitive information and system configuration changes leading to data breaches and service disruption.

🟢

If Mitigated

Limited impact if systems are isolated, patched, and monitored with proper security controls in place.

🌐 Internet-Facing: HIGH - Systems exposed to the internet are at immediate risk of exploitation due to the high CVSS score and potential for unauthenticated access.
🏢 Internal Only: HIGH - Even internally facing systems are vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity. The vulnerability allows multiple attack vectors including information disclosure, configuration changes, and command execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches as specified in Mitel Security Advisory 24-0003

Vendor Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0003

Restart Required: Yes

Instructions:

1. Review Mitel Security Advisory 24-0003. 2. Download appropriate patches from Mitel support portal. 3. Apply patches to affected systems. 4. Restart systems as required. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Isolation

all

Isolate affected systems from untrusted networks and internet access

Access Control Restrictions

all

Implement strict network access controls and firewall rules to limit access to affected systems

🧯 If You Can't Patch

  • Immediately isolate affected systems from all networks
  • Implement strict monitoring and alerting for any unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check system version against affected ranges: InAttend 2.6 SP4-2.7 or CMG 8.5 SP4-8.6

Check Version:

Check version through Mitel administration interface or system documentation

Verify Fix Applied:

Verify system version is updated beyond affected ranges and check Mitel patch installation logs

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to BluStar component
  • Unexpected system configuration changes
  • Unusual command execution patterns

Network Indicators:

  • Unusual network traffic to/from Mitel systems
  • Suspicious connections to administrative ports

SIEM Query:

source="mitel_systems" AND (event_type="configuration_change" OR event_type="command_execution")

🔗 References

📤 Share & Export