Mitel Product Security Advisory MISA-2026-0003

Linux Kernel Local Privilege Escalation Vulnerability (Copy Fail, CVE-2026-31431)

Advisory ID: MISA-2026-0003

Publish Date: 2026-05-07

Last Updated: 2026-05-11

Revision: 3.0

 

Summary

In April 2026, a local privilege escalation vulnerability in Linux Kernels was publicly disclosed.

A Local Privilege Escalation Vulnerability, CVE-2026-31431, has been identified in the algif_aead cryptographic algorithm interface of the Kernel of multiple major Linux distributions, which if successfully exploited, could allow an authenticated attacker with local access to a vulnerable system to conduct local privilege escalation due to part of the Linux kernel's cryptographic interface containing an incorrect in-place operation, where source and destination data mappings differ.

The vulnerability severity is rated as high, based on the assessment provided in the CVE record.

Mitel is actively investigating the impact of CVE‑2026‑31431 on our products and will provide updates as more information becomes available.

 

Detailed Description

This vulnerability requires authenticated local access to a vulnerable system and allows an unprivileged user to escalate privileges to root. It does not provide a direct remote attack vector.

 

Affected Products and Solutions

Mitel is actively investigating the impact of CVE‑2026‑31431 on Mitel software and hardware appliances that ship with embedded Linux operating systems or Linux Kernel. Mitel will provide updates as more information becomes available.  

For Mitel applications that are installed on a Linux operating system that is not embedded within the product, Mitel does not provide guidance for the operating system and customers should follow the instructions of the Linux operating system provider. Mitel will not deliver updates for these Linux operating systems.

Windows-based products are not affected by this vulnerability. No action is required for systems running on Microsoft Windows.

Product statements are related only to supported product versions. Products which have reached End of Support status are not considered.

 

This security advisory provides information on the following products:

 

Platforms, Solutions and Gateways:

Product NameStatusVersion(s) AffectedSolution / Mitigation
Mitel Standard LinuxAffected12.xSolution available, KB000127618
MiVoice 5000Affected8.x 
MiVoice Border GatewayAffected11.6.x, 12.xSolution available, KB000127618
MiVoice BusinessAffected10.xSolution available, KB000127618
MiVoice MX-ONEAffected7.3 to 7.8 and 8.x 
Mitel SMB ControllerNot affected  
Mitel AG41xx Analog GatewaysNot affected  
Mitel EX Controller and Mitel GX GatewayNot affected  
OpenScape 4000AffectedV10 R1.x, V11 R0.22, V11 R1.26Solution available, KB000127614
OpenScape BranchInvestigating  
OpenScape BusinessNot affected  
OpenScape SBCInvestigating  
OpenScape Voice ServerAffectedV10, V11 


Applications:

Product NameStatusVersion(s) AffectedSolution / Mitigation
MiCollabAffected10.x 
MiCloud Management PortalAffected6.3.xSolution available, KB000127618
Mitel Open Integration GatewayAffected4.3.xSolution available, KB000127618
Mitel Performance AnalyticsInvestigating  
OpenScape Alarm ResponseNot affected  
OpenScape UC ApplicationNot affected  
OpenScape Contact Media Service 
(used by Mitel CX and OpenScape 
Contact Center)
Investigating  


Devices:

Product NameStatusVersion(s) Affected Solution / Mitigation
Desktop IP Phones - 6800 SeriesInvestigating  
Desktop IP Phones - 6900 SeriesInvestigating  
Mitel 5634 Wi-Fi PhoneNot affected  
Mitel IP-DECTNot affected  
Mitel RFP12/RFP14 DECTInvestigating  
Mitel SIP-DECT RFP4G, 6xx phonesNot affected  
Mitel TA7100 Series Not affected  
OpenScape CordlessNot affected  
OpenScape DECT PhoneNot affected  
OpenScape Desk Phones CPNot affected  
OpenScape Endpoint ManagementAffectedV1 
OpenScape WLAN Phone Not affected  
OpenScape Xpert Clients 6010PAffectedV7, V8 

This section will be updated as Mitel’s investigation continues.

 

Vulnerability Severity

The vulnerability is rated as high severity, based on the assessment provided in the CVE record.

CVE ID SEVERITY CVSS 3.1 BASE SCORE 
CVE-2026-31431 High / 7.8AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

 

Solution/ Recommended Action

Mitel is actively investigating the impact of CVE‑2026‑31431 on our products and will provide updates as more information becomes available.

Please see Mitel Security Knowledge Base article KB000127609, “Linux Kernel Local Privilege Escalation Vulnerability "Copy Fail" Security Update, CVE-2026-3143133)” 

 

References

CVE‑2026‑31431

 

Revision History

VersionDateDescription
1.02026-05-07Initial release
2.02026-05-08Updated the "Status" for OpenScape Alarm Response and OpenScape WLAN Phone
Updated the "Solution / Mitigation" for OpenScape 4000
3.02026-05-11Updated the "Status" for Mitel EX Controller and Mitel GX Gateway, Mitel 5634 Wi-Fi Phone, Mitel IP-DECT, Mitel TA7100 Series, OpenScape Cordless and OpenScape DECT Phone
Updated the "Solution / Mitigation" for Mitel Standard Linux, MiVoice Border Gateway, MiVoice Business, OpenScape 4000, MiCloud Management Portal and Mitel Open Integration Gateway

 

Publisher and Legal Disclaimer

Publisher: Mitel PSIRT / [email protected]

The information provided in this advisory is provided "as is" without warranty of any kind. The information is subject to change without notice. Mitel and its affiliates do not guarantee and accept no legal liability whatsoever arising from or connected to the accuracy, reliability, currency or completeness of the information provided. No part of this document can be reproduced or transmitted in any form or by any means - electronic or mechanical - for any purpose without written permission from Mitel Networks Corporation.

Stay One Step Ahead Get notifications of the latest security advisories sent right to your inbox every week!