CVE-2024-41710

high

Description

A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system.

References

https://thehackernews.com/2025/01/new-aquabot-botnet-exploits-cve-2024.html

https://www.darkreading.com/endpoint-security/mirai-variant-aquabot-exploits-mitel-phone-flaws

https://www.bleepingcomputer.com/news/security/new-aquabotv3-botnet-malware-targets-mitel-command-injection-flaw/

https://www.akamai.com/blog/security-research/2025-january-new-aquabot-mirai-variant-exploiting-mitel-phones

https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0019

https://www.mitel.com/support/security-advisories

https://github.com/kwburns/CVE/blob/main/Mitel/6.3.0.1020/README.md

Details

Source: Mitre, NVD

Published: 2024-08-12

Updated: 2025-02-18

Risk Information

CVSS v2

Base Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Severity: High