CVE-2024-55550

2.7 LOW CISA KEV - Actively Exploited
Published: December 10, 2024 Modified: November 04, 2025

Description

Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
2.7 / 10.0
EPSS (Exploit Probability)
8.5%
92th percentile
Exploitation Status
Actively Exploited
Remediation due: 2025-01-28

Weaknesses (CWE)

Affected Vendors

mitel