CVE-2025-52913
📋 TL;DR
An unauthenticated path traversal vulnerability in Mitel MiCollab's NuPoint Unified Messaging component allows attackers to access, modify, or delete sensitive data and system configurations without credentials. This affects all MiCollab deployments up to version 9.8 SP2 (9.8.2.12). Organizations using vulnerable versions are at immediate risk of data compromise.
💻 Affected Systems
- Mitel MiCollab with NuPoint Unified Messaging (NPM) component
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise: attackers could delete all user data, corrupt system configurations causing service disruption, and potentially pivot to other systems.
Likely Case
Unauthorized access to sensitive voicemail messages, user data, and configuration files leading to data theft or service manipulation.
If Mitigated
Limited impact with proper network segmentation and access controls, though vulnerable systems remain at risk of exploitation.
🎯 Exploit Status
The vulnerability requires no authentication and involves path traversal techniques, making exploitation relatively straightforward for attackers with network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Mitel advisory MISA-2025-0007 for specific patched versions
Vendor Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0007
Restart Required: Yes
Instructions:
1. Review Mitel advisory MISA-2025-0007. 2. Download and apply the appropriate patch from Mitel support portal. 3. Restart affected services. 4. Verify patch application.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to MiCollab NPM web interface to trusted IP addresses only
Use firewall rules to limit access to MiCollab ports (typically 80/443) from authorized networks
Web Application Firewall
allDeploy WAF with path traversal protection rules
Configure WAF to block requests containing '../', '..\', and other directory traversal patterns
🧯 If You Can't Patch
- Isolate vulnerable systems in separate network segments with strict access controls
- Implement comprehensive monitoring and alerting for suspicious file access patterns
🔍 How to Verify
Check if Vulnerable:
Check MiCollab version via web interface or command line. Versions up to 9.8.2.12 are vulnerable.
Check Version:
Check web interface admin panel or consult system documentation for version command
Verify Fix Applied:
Verify version is updated beyond 9.8.2.12 and test path traversal attempts return proper errors.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in web server logs
- Multiple failed path traversal attempts
- Access to sensitive configuration or data files from unexpected sources
Network Indicators:
- HTTP requests containing '../' or similar traversal patterns to MiCollab endpoints
- Unusual file downloads from NPM component
SIEM Query:
source="web_logs" AND (uri="*../*" OR uri="*..\\*" OR uri="*%2e%2e%2f*") AND dest_ip="[MiCollab_IP]"