Security

Cyber-crime

PoC exploit chains Mitel MiCollab 0-day, auth-bypass bug to access sensitive files

Still unpatched 100+ days later, watchTowr says


updated A zero-day arbitrary file read vulnerability in Mitel MiCollab can be chained with a now-patched critical bug in the same platform to give attackers access to sensitive files on vulnerable instances. 

A proof-of-concept (PoC) exploit that strings together the two flaws, both spotted and disclosed to Mitel by watchTowr, which on Thursday published the PoC after waiting 100-plus days for the vendor to issue a fix.

The Register has reached out to Mitel for comment and did not immediately receive a response to our questions including when the zero-day will be patched. We will update this story if and when we hear back.

Mitel MiCollab, as the name suggests, is an enterprise collaboration tool that allows users to communicate and connect with employees and customers via a range of features including voice, video, chat messaging, SMS, web conferencing and file sharing. It's widely used, boasting more than 16,000 instances across the Internet. And, as such, it's a very attractive target for ransomware gangs and other cybercriminals.

Back in May, watchTowr's bug hunters discovered and disclosed to Mitel a now-fixed critical SQL injection vulnerability in the NuPoint Unified Messaging (NPM) component of the MiCollab product. This 9.8-rated flaw is tracked as CVE-2024-35286, and could allow an unauthenticated attacker to access sensitive information and execute arbitrary database and management operations. The vendor closed the hole in May.

Additionally, the watchTowr team found and reported an authentication bypass vulnerability (CVE-2024-41713) that also affects the NPM component of Mitel MiCollab. 

This one is due to insufficient input validation, and it could be abused to allow an unauthenticated attacker to conduct a path traversal attack, and thus view, corrupt, or delete users' data and system configurations. Mitel fixed this one in October.

While investigating these two security holes, watchTowr found a third flaw that hasn't been assigned a CVE and doesn't yet have a patch. It's an arbitrary file read flaw that requires authentication to exploit — and this is why the PoC chains it with CVE-2024-41713, thus allowing an attacker to bypass authentication and then access files such as "/etc/passwd" that contain account information.

The researchers say they contacted Mitel about the arbitrary file read bug on August 26 and the vendor, in October, promised a patch the first week in December.

"Unfortunately, we're past this period and have not seen any updates on Mitel's Security Advisory page," according to a watchTowr report about the three bugs published on Thursday. "Since our disclosure email was sent over 100 days ago, we've decided to proceed and include this vulnerability within our blog post - but as of writing, it remains unpatched (albeit post-auth)." ®

Updated to add at 1640 UTC on December 6, 2024

After watchTowr published its report, Mitel issued a security advisory about the arbitrary file read vulnerability, which it rated as a low-severity risk, and said it will be fixed in future product updates.

According to the advisory: "The low severity local file read exposure is substantially mitigated by MiCollab 9.8 SP2 (9.8.2.12)." This is the software update that closes the critical auth-bypass hole, CVE-2024-41713.

Mitel didn't say when it plans to patch the zero day, which still doesn't have a CVE assigned.

A spokesperson sent The Register the following statement:

"Our top priority is to ensure the reliability and security of the solutions we offer our customers. We recently became aware of vulnerabilities relating to MiCollab and have published recommended actions, including software updates, to mitigate risks. We strongly encourage customers to apply all available security updates as they become available."

Send us news
4 Comments

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog

Biden signs sweeping cybersecurity order, just in time for Trump to gut it

Ransomware, AI, secure software, digital IDs – there's something for everyone in the presidential directive

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools

Microsoft eggheads say AI can never be made secure – after testing Redmond's own products

If you want a picture of the future, imagine your infosec team stamping on software forever

Look for the label: White House rolls out 'Cyber Trust Mark' for smart devices

Beware the IoT that doesn’t get a security tag

CISA: Wow, that election had a lot of foreign trolling. Trump's Homeland Sec pick: And that's none of your concern

Cyber agency too 'far off mission,' says incoming boss Kristi Noem

OpenAI's ChatGPT crawler can be tricked into DDoSing sites, answering your queries

The S in LLM stands for Security

Nominet probes network intrusion linked to Ivanti zero-day exploit

Unauthorized activity detected, but no backdoors found

After China's Salt Typhoon, the reconstruction starts now

If 40 years of faulty building gets blown down, don’t rebuild with the rubble

Cryptojacking, backdoors abound as fiends abuse Aviatrix Controller bug

This is what happens when you publish PoCs immediately, hm?

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys