3 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 2

A vulnerability in Mitel 6900 Series IP (MiNet) phones excluding 6970, versions 1.8 (1.8.0.12) and earlier, could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution. Una vulnerabilidad en los teléfonos IP de la serie 6900 de Mitel (MiNet), excepto el 6970, versiones 1.8 (1.8.0.12) y anteriores, podría permitir a un atacante no autenticado con acceso físico al teléfono conseguir acceso de root debido a un control de acceso insuficiente para la funcionalidad test durante el inicio del sistema. Una explotación con éxito podría permitir el acceso a información confidencial y una ejecución de código Mitel 6800/6900 Series SIP Phones excluding 6970 and Mitel 6900 Series IP (MiNet) Phones have a flow to spawn a telnet backdoor on the device with a static root password enabled. Affected versions include Rel 5.1 SP8 (5.1.0.8016) and earlier, Rel 6.0 (6.0.0.368) to 6.1 HF4 (6.1.0.165), and MiNet 1.8.0.12 and earlier. • http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html http://seclists.org/fulldisclosure/2022/Jun/32 https://www.mitel.com/support/security-advisories https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0003 https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021 • CWE-863: Incorrect Authorization •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

Mitel 6800 and 6900 Series SIP phone devices through 2022-04-27 have "undocumented functionality." A vulnerability in Mitel 6800 Series and 6900 Series SIP phones excluding 6970, versions 5.1 SP8 (5.1.0.8016) and earlier, and 6.0 (6.0.0.368) through 6.1 HF4 (6.1.0.165), could allow a unauthenticated attacker with physical access to the phone to gain root access due to insufficient access control for test functionality during system startup. A successful exploit could allow access to sensitive information and code execution. Los dispositivos telefónicos SIP de las series 6800 y 6900 de Mitel versiones hasta 27-04-2022, presentan una "funcionalidad no documentada". Una vulnerabilidad en los teléfonos SIP de las series 6800 y 6900 de Mitel, excepto el 6970, versiones 5.1 SP8 (5.1.0.8016) y anteriores, y 6.0 (6.0.0.368) hasta 6.1 HF4 (6.1.0.165), podría permitir a un atacante no autenticado con acceso físico al teléfono conseguir acceso root debido a un control de acceso insuficiente para la funcionalidad test durante el inicio del sistema. • http://packetstormsecurity.com/files/167547/Mitel-6800-6900-Series-SIP-Phones-Backdoor-Access.html http://seclists.org/fulldisclosure/2022/Jun/32 https://www.mitel.com/support/security-advisories https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0004 https://www.syss.de/pentest-blog/undocumented-functionality-backdoor-in-mitel-desk-phones-syss-2022-021 •

CVSS: 7.5EPSS: 0%CPEs: 77EXPL: 0

The Web UI component of Mitel MiVoice 6800 and 6900 series SIP Phones with firmware before 5.1.0.SP5 could allow an unauthenticated attacker to expose sensitive information due to improper memory handling during failed login attempts. El componente de la Interfaz de Usuario Web de los Teléfonos SIP de la Serie Mitel MiVoice 6800 y 6900 con versiones de firmware anteriores a 5.1.0.SP5, podría permitir a un atacante no autenticado exponer información confidencial debido a un manejo inapropiado de la memoria durante los intentos fallidos de inicio de sesión • https://www.mitel.com/support/security-advisories https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0007 • CWE-307: Improper Restriction of Excessive Authentication Attempts •