Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
References
| Link | Resource |
|---|---|
| https://www.mitel.com/support/security-advisories | Vendor Advisory |
| https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 | Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-55550 | US Government Resource |
Configurations
History
04 Nov 2025, 15:02
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-55550 - US Government Resource | |
| CPE | cpe:2.3:a:mitel:micollab:9.8:-:*:*:*:-:*:* |
Information
Published : 2024-12-10 19:15
Updated : 2025-11-04 15:02
NVD link : CVE-2024-55550
Mitre link : CVE-2024-55550
CVE.ORG link : CVE-2024-55550
JSON object : View
Products Affected
mitel
- micollab
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
