CVE-2024-35284

5.4 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute reflected cross-site scripting (XSS) attacks against users of Mitel MiContact Center Business's legacy chat component. Attackers can inject malicious scripts that execute in victims' browsers when they visit specially crafted URLs. Organizations running vulnerable versions of MiContact Center Business are affected.

💻 Affected Systems

Products:
  • Mitel MiContact Center Business
Versions: Through 10.0.0.4
Operating Systems: All supported OS for MiContact Center Business
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the legacy chat component. Modern chat components are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, credentials, or sensitive data from authenticated users, potentially leading to account takeover, data exfiltration, or further system compromise.

🟠

Likely Case

Attackers would typically use this to steal session cookies or credentials from users who click malicious links, enabling unauthorized access to the contact center system.

🟢

If Mitigated

With proper web application firewalls, input validation, and user education about suspicious links, impact is limited to unsuccessful exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Reflected XSS typically requires social engineering to trick users into clicking malicious links. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.0.5 and later

Vendor Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0012

Restart Required: Yes

Instructions:

1. Download patch from Mitel support portal. 2. Backup current configuration. 3. Apply patch following Mitel documentation. 4. Restart MiContact Center Business services. 5. Verify functionality.

🔧 Temporary Workarounds

Disable Legacy Chat Component

all

Temporarily disable the vulnerable legacy chat component until patching can be completed.

Consult Mitel documentation for component-specific disable procedures

Implement WAF Rules

all

Configure web application firewall to block XSS payloads targeting the chat endpoint.

Add WAF rule: Block requests containing common XSS patterns to /chat/* endpoints

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent script execution from untrusted sources
  • Deploy network segmentation to isolate MiContact Center Business from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if MiContact Center Business version is 10.0.0.4 or earlier and legacy chat component is enabled.

Check Version:

Check version in MiContact Center Business administration interface or consult system documentation.

Verify Fix Applied:

Verify system version is 10.0.0.5 or later and test chat functionality with XSS payloads that should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to chat endpoints containing script tags or JavaScript code
  • Unusual chat component errors

Network Indicators:

  • HTTP requests with XSS payload patterns to /chat/* endpoints
  • Suspicious redirects from chat URLs

SIEM Query:

source="web_logs" AND (url="*/chat/*" AND (content="<script>" OR content="javascript:" OR content="onerror=" OR content="onload="))

🔗 References

📤 Share & Export