Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Nov 2025 00:15:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:mitel:micollab:9.8:-:*:*:*:-:*:*
cpe:2.3:a:mitel:micollab:9.8:sp1:*:*:*:-:*:*

Wed, 22 Oct 2025 08:15:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Wed, 30 Jul 2025 11:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Jan 2025 06:15:00 +0900

Type Values Removed Values Added
First Time appeared Mitel
Mitel micollab
CPEs cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*
cpe:2.3:a:mitel:micollab:9.8:-:*:*:*:-:*:*
cpe:2.3:a:mitel:micollab:9.8:sp1:*:*:*:-:*:*
Vendors & Products Mitel
Mitel micollab

Wed, 08 Jan 2025 03:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-01-07'}


Wed, 08 Jan 2025 01:45:00 +0900

Type Values Removed Values Added
Weaknesses CWE-125

Wed, 08 Jan 2025 01:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-22
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Dec 2024 00:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Dec 2024 03:30:00 +0900

Type Values Removed Values Added
Description Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-21T22:55:34.692Z

Reserved: 2024-12-08T00:00:00.000Z

Link: CVE-2024-55550

cve-icon Vulnrichment

Updated: 2024-12-11T14:59:20.352Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-10T19:15:31.110

Modified: 2025-11-04T15:02:31.447

Link: CVE-2024-55550

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses