CVE-2025-67822

9.4 CRITICAL

📋 TL;DR

An authentication bypass vulnerability in Mitel MiVoice MX-ONE Provisioning Manager allows unauthenticated attackers to gain unauthorized access to user or admin accounts. This affects versions 7.3 through 7.8 SP1. Organizations using these versions should patch immediately.

💻 Affected Systems

Products:
  • Mitel MiVoice MX-ONE
Versions: 7.3 (7.3.0.0.50) through 7.8 SP1 (7.8.1.0.14)
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Provisioning Manager component specifically. All installations within the version range are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative access, allowing data theft, service disruption, and lateral movement within the network.

🟠

Likely Case

Unauthorized access to user accounts leading to data exposure, privilege escalation, and potential persistence in the system.

🟢

If Mitigated

Limited impact if system is isolated behind firewalls with strict network controls and monitored for suspicious authentication attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated exploitation due to improper authentication mechanisms (CWE-287).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Mitel advisory MISA-2025-0009 for specific patched versions

Vendor Advisory: https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0009

Restart Required: Yes

Instructions:

1. Review Mitel advisory MISA-2025-0009. 2. Download and apply the appropriate patch from Mitel support. 3. Restart affected services. 4. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to the Provisioning Manager component to trusted IPs only

Configure firewall rules to allow only specific IPs to access the Provisioning Manager port

🧯 If You Can't Patch

  • Isolate the system from internet and untrusted networks using firewall rules
  • Implement strict network segmentation and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check the system version against the affected range: 7.3 (7.3.0.0.50) through 7.8 SP1 (7.8.1.0.14)

Check Version:

Check system administration interface or consult Mitel documentation for version query commands

Verify Fix Applied:

Verify the installed version is outside the vulnerable range or check with Mitel support for patch confirmation

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts from unexpected IPs
  • Multiple failed login attempts followed by successful access
  • Administrative actions from non-admin accounts

Network Indicators:

  • Unusual traffic patterns to Provisioning Manager ports
  • Authentication requests from external/untrusted sources

SIEM Query:

source_ip NOT IN trusted_ips AND destination_port=provisioning_manager_port AND auth_success=true

🔗 References

📤 Share & Export