Mitel Product Security Advisory MISA-2025-0009

MX-ONE Authentication Bypass Vulnerability

Advisory ID: MISA-2025-0009

First Issue Date: 2025-07-23

Last Updated: 2025-07-23

Revision: 1.0

Summary

An authentication bypass vulnerability has been identified in the Provisioning Manager component of Mitel MiVoice MX-ONE, which if successfully exploited could allow an unauthenticated attacker to conduct an authentication bypass attack due to improper access control.

A successful exploit of this vulnerability could allow an attacker to gain unauthorized access to user or admin accounts in the system.

The vulnerability severity is rated as critical.

Mitel is recommending customers with affected product versions apply the fixes in the highlighted solution. For customers that are unable to update in a timely manner, Mitel recommends reviewing available workarounds.

Affected Products and Solutions

This security advisory provides information on the following products:

PRODUCT NAMEVERSION(S) AFFECTEDSOLUTION(S) AVAILABLE
MiVoice MX-ONE7.3 (7.3.0.0.50) to 7.8 SP1 (7.8.1.0.14)

Mitel provided patches, MXO-15711_78SP0 and MXO-15711_78SP1, that are available for releases MX-ONE versions 7.8 & 7.8 SP1 respectively.

 

For MiVoice MX-ONE version 7.3 and above, please submit a patch request to your authorized service partner. Patches are made available at Mitel's discretion.

Product statements are related only to supported product versions. Products which have reached End of Support status are not considered.

 

Vulnerability Severity

The following products have been identified as affected:

PRODUCT NAMECVE IDSEVERITYCVSS 3.1 BASE SCORE
MiVoice MX-ONE Critical / 9.4AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

The vulnerability severity is rated as critical.

Mitigations / Workarounds

Customers with affected product versions should apply the fixes in the highlighted solution.

Do not expose the MX-ONE services directly to the public internet. Ensure that the MX-ONE system is deployed within a trusted network.

The risk may be mitigated by restricting access to the Provisioning Manager service. For instructions on how to disable the Provisioning Manager service, please follow the instructions found in the KMS article.

Solution/ Recommended Action

Mitel provided patches MXO-15711_78SP0 and MXO-15711_78SP1 that address this vulnerability for MiVoice MX-ONE releases 7.8 & 7.8 SP1 respectively.

For MiVoice MX-ONE version 7.3 and above, please submit a patch request to your authorized service partner. Patches are made available at Mitel's discretion.

Please see Mitel Knowledge Base article SO8566, “MiVoice MX-ONE Security Update” https://mitel.custhelp.com/app/answers/answer_view/a_id/1021860 .

If you do not have access to this link, please contact your Mitel Authorized Partner for support.

For further information, please contact Mitel Product Support. 

Revision History

Version

Date

Description

1.0

2025-07-23

Initial version

Publisher and Legal Disclaimer

Publisher: Mitel PSIRT / [email protected]

The information provided in this advisory is provided "as is" without warranty of any kind. The information is subject to change without notice. Mitel and its affiliates do not guarantee and accept no legal liability whatsoever arising from or connected to the accuracy, reliability, currency or completeness of the information provided. No part of this document can be reproduced or transmitted in any form or by any means - electronic or mechanical - for any purpose without written permission from Mitel Networks Corporation.

Stay One Step Ahead Get notifications of the latest security advisories sent right to your inbox every week!