Skip to main content

Exploitation of RCE Vulnerability in Mitel MiVoice Connect

Mitel MiVoice Connect has a data validation vulnerability that can be leveraged to perform RCE

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Mitel MiVoice Connect has a data validation vulnerability that can be leveraged to perform RCE


Threat details

Introduction

Crowdstrike Services have reported seeing exploitation of a critical vulnerability in Mitel MiVoice Connect, which is a Linux-based Voice over IP (VOIP) appliance. Crowdstrike Services said that a remote code execution (RCE) exploit was used in a suspected ransomware attack in an attempt to gain initial access.

The vulnerability, known as CVE-2022-29499, has a CVSSv3 score of 9.8 and requires no privileges and no user interaction. An unauthenticated, remote attacker could exploit this vulnerability to achieve remote code execution within the context of the service appliance and take control of the system.

Exploitation by ransomware operators in the wild

CISA has added CVE-2022-29499 to their Known Exploited Vulnerabilities Catalog. This catalogue is used to describe vulnerabilities that are a frequent attack vector for malicious cyber actors and therefore pose a significant risk.


Remediation advice

Affected organisations are encouraged to review Mitel Security Advisory 22-0002 and apply the necessary update.



Last edited: 28 June 2022 9:47 am