LOGIN PORTAL
Americas
Oceania
Solutions
Business Size
Industries
Partners
App & Developers
Services
Training
Mitel User Group
Support
Partners
Unified Communications Collaboration
Contact Center
Devices
Newsroom
Customer Success
Blog
Resource Center
Careers
Location: Canada (EN)
Advisory ID: 20-0006
Publish Date: 2020-06-01
Last Updated: 2020-07-16
Revision: 2.0
A Remote Code Execution vulnerability has been identified in the Connect Client of MiVoice Connect. This vulnerability if exploited could allow an attacker to execute arbitrary code in the chat notification window, due to improper rendering of chat messages. A successful exploit could allow an attacker to steal session cookies, directory traversal and run under the context of the chat client.
Mitel is recommending customers with affected product versions, update to the latest release.
Product Name | Product Version | Security Bulletin | Last Updated |
---|---|---|---|
MiVoice Connect Client | MiVoice Connect Client 214.100.1222.0 and earlier | 2020-07-16 |
The risk for this vulnerability is rated as Medium. Refer to the product Security Bulletins for additional statements regarding risk.
Mitel has issued new releases of the affected software. Customers are advised to update their software to the latest versions.
Customers are advised to review the product Security Bulletin. For additional information, contact Product Support.
Version | Date | Description |
---|---|---|
1.0 | 2020-06-01 | Initial version |
2.0 | 2020-07-16 | Updated version |