CVE-2025-52913

9.8 CRITICAL

📋 TL;DR

An unauthenticated path traversal vulnerability in Mitel MiCollab's NuPoint Unified Messaging component allows attackers to access, modify, or delete sensitive data and system configurations without credentials. This affects all MiCollab deployments up to version 9.8 SP2 (9.8.2.12). Organizations using vulnerable versions are at immediate risk of data compromise.

💻 Affected Systems

Products:
  • Mitel MiCollab with NuPoint Unified Messaging (NPM) component
Versions: Through 9.8 SP2 (9.8.2.12)
Operating Systems: Not specified - likely various Linux distributions
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with NPM component enabled are vulnerable. The vulnerability exists in the web interface component.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise: attackers could delete all user data, corrupt system configurations causing service disruption, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized access to sensitive voicemail messages, user data, and configuration files leading to data theft or service manipulation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though vulnerable systems remain at risk of exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and involves path traversal techniques, making exploitation relatively straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Mitel advisory MISA-2025-0007 for specific patched versions

Vendor Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0007

Restart Required: Yes

Instructions:

1. Review Mitel advisory MISA-2025-0007. 2. Download and apply the appropriate patch from Mitel support portal. 3. Restart affected services. 4. Verify patch application.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to MiCollab NPM web interface to trusted IP addresses only

Use firewall rules to limit access to MiCollab ports (typically 80/443) from authorized networks

Web Application Firewall

all

Deploy WAF with path traversal protection rules

Configure WAF to block requests containing '../', '..\', and other directory traversal patterns

🧯 If You Can't Patch

  • Isolate vulnerable systems in separate network segments with strict access controls
  • Implement comprehensive monitoring and alerting for suspicious file access patterns

🔍 How to Verify

Check if Vulnerable:

Check MiCollab version via web interface or command line. Versions up to 9.8.2.12 are vulnerable.

Check Version:

Check web interface admin panel or consult system documentation for version command

Verify Fix Applied:

Verify version is updated beyond 9.8.2.12 and test path traversal attempts return proper errors.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in web server logs
  • Multiple failed path traversal attempts
  • Access to sensitive configuration or data files from unexpected sources

Network Indicators:

  • HTTP requests containing '../' or similar traversal patterns to MiCollab endpoints
  • Unusual file downloads from NPM component

SIEM Query:

source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*") AND dest_ip="[MiCollab_IP]"

🔗 References

📤 Share & Export