The chat window of the Mitel BusinessCTI Enterprise (MBC-E) Client for Windows before 6.4.15 and 7.x before 7.1.2 could allow an attacker to gain access to user information by sending certain code, due to improper input validation of http links. A successful exploit could allow an attacker to view user information and application data.
References
Link | Resource |
---|---|
https://www.mitel.com/support/security-advisories | Vendor Advisory |
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0001 | Vendor Advisory |
https://www.mitel.com/support/security-advisories | Vendor Advisory |
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0001 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.mitel.com/support/security-advisories - Vendor Advisory | |
References | () https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-21-0001 - Vendor Advisory |
Information
Published : 2021-01-29 07:15
Updated : 2024-11-21 06:21
NVD link : CVE-2021-3176
Mitre link : CVE-2021-3176
CVE.ORG link : CVE-2021-3176
JSON object : View
Products Affected
mitel
- businesscti_enterprise
CWE
CWE-20
Improper Input Validation