CVE-2024-41713

9.1 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to perform path traversal attacks on Mitel MiCollab's NuPoint Unified Messaging component. Attackers can access, modify, or delete user data and system configurations without authentication. Organizations running affected Mitel MiCollab versions are at risk.

💻 Affected Systems

Products:
  • Mitel MiCollab
Versions: Through 9.8 SP1 FP2 (9.8.1.201)
Operating Systems: Not OS-specific - affects MiCollab application
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the NuPoint Unified Messaging (NPM) component

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing data theft, configuration corruption, service disruption, and potential lateral movement within the network.

🟠

Likely Case

Unauthorized access to sensitive voicemail data, configuration files, and potential data manipulation or deletion.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for data exposure if system is internet-facing.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to their Known Exploited Vulnerabilities catalog, indicating active exploitation

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.8.1.202 or later

Vendor Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029

Restart Required: Yes

Instructions:

1. Download patch from Mitel support portal. 2. Backup current configuration. 3. Apply patch following Mitel's installation guide. 4. Restart MiCollab services. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to MiCollab servers to only trusted internal networks

Access Control Lists

all

Implement strict firewall rules to limit inbound connections to MiCollab

🧯 If You Can't Patch

  • Isolate MiCollab servers from internet access and untrusted networks
  • Implement strict network monitoring and alerting for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check MiCollab version in administration console or via system logs

Check Version:

Check via MiCollab web interface: Administration > System Information

Verify Fix Applied:

Verify version is 9.8.1.202 or later in administration console

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in NPM logs
  • Multiple failed path traversal attempts
  • Access to configuration files from unexpected sources

Network Indicators:

  • HTTP requests with directory traversal patterns (../)
  • Unusual traffic to NPM component from external sources

SIEM Query:

source="micollab-logs" AND ("../" OR "..\" OR "%2e%2e%2f")

🔗 References

📤 Share & Export