A vulnerability in the management interface of MiVoice Business through 9.3 PR1 and MiVoice Business Express through 8.0 SP3 PR3 could allow an unauthenticated attacker (that has network access to the management interface) to conduct a buffer overflow attack due to insufficient validation of URL parameters. A successful exploit could allow arbitrary code execution.
References
Link | Resource |
---|---|
https://www.mitel.com/support/security-advisories | Vendor Advisory |
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0005 | Vendor Advisory |
https://www.mitel.com/support/security-advisories | Vendor Advisory |
https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0005 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.mitel.com/support/security-advisories - Vendor Advisory | |
References | () https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-22-0005 - Vendor Advisory |
Information
Published : 2022-06-17 13:15
Updated : 2024-11-21 07:05
NVD link : CVE-2022-31784
Mitre link : CVE-2022-31784
CVE.ORG link : CVE-2022-31784
JSON object : View
Products Affected
mitel
- mivoice_business_express
- mivoice_business
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')