CVE-2024-35314

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Mitel MiCollab Desktop Client and MiVoice Business SVI allows unauthenticated attackers to execute arbitrary commands through command injection. Attackers can exploit insufficient parameter sanitization when users interact with malicious content. Organizations using MiCollab through version 9.7.1.110 or MiVB SVI 1.0.0.25 are affected.

💻 Affected Systems

Products:
  • Mitel MiCollab Desktop Client
  • Mitel MiVoice Business Solution Virtual Instance (MiVB SVI)
Versions: MiCollab through 9.7.1.110, MiVB SVI 1.0.0.25
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction for exploitation. Both on-premises and virtual deployments are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over affected systems, potentially leading to data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Attackers execute malicious scripts to steal credentials, install backdoors, or deploy malware on user workstations, requiring user interaction with crafted content.

🟢

If Mitigated

Limited impact with proper network segmentation, endpoint protection, and user awareness preventing successful exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires user interaction but no authentication. CVSS 9.8 indicates critical severity with high attack vector and low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: MiCollab 9.7.1.111 or later, MiVB SVI updates per vendor advisory

Vendor Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0015

Restart Required: Yes

Instructions:

1. Download latest patches from Mitel support portal. 2. Apply patches to all affected systems. 3. Restart services and verify installation. 4. Test functionality before production deployment.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Mitel systems from internet and restrict internal access to necessary users only.

User Awareness Training

all

Train users to avoid interacting with suspicious content in Mitel applications.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of Mitel systems
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious command execution

🔍 How to Verify

Check if Vulnerable:

Check MiCollab version in application settings or About dialog. For MiVB SVI, check version in administration console.

Check Version:

MiCollab: Check Help > About. MiVB SVI: Use admin console or command line tools specific to deployment.

Verify Fix Applied:

Verify installed version is MiCollab 9.7.1.111+ or updated MiVB SVI version per vendor guidance.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution from Mitel processes
  • Suspicious script execution in application logs
  • Failed authentication attempts followed by command execution

Network Indicators:

  • Unexpected outbound connections from Mitel systems
  • Command and control traffic from Mitel workstations

SIEM Query:

process_name:"MiCollab.exe" AND (cmdline:*powershell* OR cmdline:*cmd.exe* OR cmdline:*wscript*)

🔗 References

📤 Share & Export