CVE-2024-55550

Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*

History

04 Nov 2025, 15:02

Type Values Removed Values Added
References () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-55550 - () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-55550 - US Government Resource
CPE cpe:2.3:a:mitel:micollab:9.8:sp1:*:*:*:-:*:*
cpe:2.3:a:mitel:micollab:9.8:-:*:*:*:-:*:*

Information

Published : 2024-12-10 19:15

Updated : 2025-11-04 15:02


NVD link : CVE-2024-55550

Mitre link : CVE-2024-55550

CVE.ORG link : CVE-2024-55550


JSON object : View

Products Affected

mitel

  • micollab
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')