Mitel Product Security Advisory 21-0001

Mitel BusinessCTI Enterprise - Remote Code Execution Vulnerability

Advisory ID: 21-0001

Publish Date: 2021-01-25

Last Updated: 2021-01-25

Revision: 1.0



The chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows could allow an attacker to gain access to user information by sending arbitrary code, due to improper input validation of http links. A successful exploit could allow an attacker to view the user information and application data.

Mitel is recommending customers with affected product versions, update to the latest release.



Affected Products




Risk Assessment

The risks for these vulnerabilities are rated as High. Refer to the product Security Bulletins for additional statements regarding risk.


Mitigation / Recommended Action

Mitel has issued new releases of the affected software. Customers are advised to update their software to the latest versions.

As a workaround, the chat functionality of Mitel BusinessCTI Enterprise (MBC-E) can be temporarily disabled to prevent the chat window from opening.

Mitel partners and customers are advised to review the product Security Bulletin. For additional information, contact Product Support.


External References



Related CVEs / CWEs / Advisories



Revision History

Prêt à parler aux ventes ? Contactez-nous.