CVE-2024-31967

9.1 CRITICAL

📋 TL;DR

An improper access control vulnerability in Mitel SIP phones allows unauthenticated attackers to access user information or system configuration. This affects Mitel 6800 Series, 6900 Series, 6900w Series SIP phones, and 6970 Conference Units with specific firmware versions. Attackers can exploit this remotely without credentials.

💻 Affected Systems

Products:
  • Mitel 6800 Series SIP Phones
  • Mitel 6900 Series SIP Phones
  • Mitel 6900w Series SIP Phones
  • Mitel 6970 Conference Unit
Versions: Through 6.3 SP3 HF4 for 6800/6900 Series, through 6.3.3 for 6900w Series, through 5.1.1 SP8 for 6970 Conference Unit
Operating Systems: Embedded phone firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions in default configuration are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of phone systems leading to data theft, eavesdropping on calls, or using phones as footholds into corporate networks.

🟠

Likely Case

Unauthorized access to sensitive configuration data, user credentials, or call logs that could enable further attacks.

🟢

If Mitigated

Limited impact if phones are isolated on separate VLANs with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and appears to be straightforward to exploit based on the CVSS score and description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Mitel advisory for specific patched versions

Vendor Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0010

Restart Required: Yes

Instructions:

1. Review Mitel Security Advisory 24-0010. 2. Download appropriate firmware updates from Mitel support portal. 3. Apply updates to affected devices following Mitel's upgrade procedures. 4. Reboot devices after firmware update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate VoIP phones on separate VLAN with strict firewall rules limiting access to management interfaces

Access Control Lists

all

Implement ACLs to restrict access to phone management interfaces to authorized administrative networks only

🧯 If You Can't Patch

  • Segment VoIP network completely from other corporate networks
  • Implement strict firewall rules blocking all external access to phone management interfaces

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via phone web interface or Mitel management console against affected version ranges

Check Version:

Access phone web interface at http://<phone-ip> and check firmware version in System Information

Verify Fix Applied:

Verify firmware version has been updated to patched version and test unauthorized access attempts fail

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to phone web interfaces
  • Multiple failed authentication attempts followed by successful access
  • Configuration changes from unexpected IP addresses

Network Indicators:

  • HTTP/HTTPS traffic to phone management interfaces from unauthorized sources
  • Unusual outbound connections from phones

SIEM Query:

source_ip NOT IN authorized_admin_networks AND dest_port IN (80,443,5060,5061) AND dest_ip IN voip_subnet

🔗 References

📤 Share & Export