Metrics
Affected Vendors & Products
Tue, 18 Feb 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mitel 6863i Sip
Mitel 6865i Sip Mitel 6867i Sip Mitel 6869i Sip Mitel 6873i Sip Mitel 6905 Sip Mitel 6910 Sip Mitel 6915 Sip Mitel 6920 Sip Mitel 6920w Sip Mitel 6930 Sip Mitel 6930w Sip Mitel 6940 Sip Mitel 6940w Sip Mitel 6970 Mitel 6970 Firmware |
|
CPEs | cpe:2.3:h:mitel:6863i_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6865i_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6867i_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6869i_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6873i_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6905_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6910_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6915_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6920_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6920w_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6930_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6930w_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6940_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6940w_sip:-:*:*:*:*:*:*:* cpe:2.3:h:mitel:6970:-:*:*:*:*:*:*:* cpe:2.3:o:mitel:6865i_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6867i_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6869i_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6873i_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6930_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6940_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6970_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Mitel 6863i Sip
Mitel 6865i Sip Mitel 6867i Sip Mitel 6869i Sip Mitel 6873i Sip Mitel 6905 Sip Mitel 6910 Sip Mitel 6915 Sip Mitel 6920 Sip Mitel 6920w Sip Mitel 6930 Sip Mitel 6930w Sip Mitel 6940 Sip Mitel 6940w Sip Mitel 6970 Mitel 6970 Firmware |
Wed, 12 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Wed, 12 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
ssvc
|
Wed, 14 Aug 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mitel
Mitel 6863i Sip Firmware Mitel 6865i Sip Firmware Mitel 6867i Sip Firmware Mitel 6869i Sip Firmware Mitel 6873i Sip Firmware Mitel 6905 Sip Firmware Mitel 6910 Sip Firmware Mitel 6915 Sip Firmware Mitel 6920 Sip Firmware Mitel 6920w Sip Firmware Mitel 6930 Sip Firmware Mitel 6930w Sip Firmware Mitel 6940 Sip Firmware Mitel 6940w Sip Firmware Mitel 6970 Conference Firmware |
|
Weaknesses | CWE-88 | |
CPEs | cpe:2.3:o:mitel:6863i_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6865i_sip_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitel:6867i_sip_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitel:6869i_sip_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitel:6873i_sip_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitel:6905_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6910_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6915_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6920_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6920w_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6930_sip_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitel:6930w_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6940_sip_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:mitel:6940w_sip_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:mitel:6970_conference_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Mitel
Mitel 6863i Sip Firmware Mitel 6865i Sip Firmware Mitel 6867i Sip Firmware Mitel 6869i Sip Firmware Mitel 6873i Sip Firmware Mitel 6905 Sip Firmware Mitel 6910 Sip Firmware Mitel 6915 Sip Firmware Mitel 6920 Sip Firmware Mitel 6920w Sip Firmware Mitel 6930 Sip Firmware Mitel 6930w Sip Firmware Mitel 6940 Sip Firmware Mitel 6940w Sip Firmware Mitel 6970 Conference Firmware |
|
Metrics |
cvssV3_1
|
Tue, 13 Aug 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 12 Aug 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T04:55:19.982Z
Reserved: 2024-07-22T00:00:00.000Z
Link: CVE-2024-41710

Updated: 2024-08-14T17:26:41.540Z

Status : Analyzed
Published: 2024-08-12T19:15:16.850
Modified: 2025-02-18T15:28:00.123
Link: CVE-2024-41710

No data.