Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 05 Nov 2025 00:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:mitel:micollab:9.8:sp1:*:*:*:-:*:* |
Wed, 22 Oct 2025 08:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 05:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Oct 2025 04:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 30 Jul 2025 11:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Thu, 09 Jan 2025 06:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mitel
Mitel micollab |
|
| CPEs | cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:* cpe:2.3:a:mitel:micollab:9.8:-:*:*:*:-:*:* cpe:2.3:a:mitel:micollab:9.8:sp1:*:*:*:-:*:* |
|
| Vendors & Products |
Mitel
Mitel micollab |
Wed, 08 Jan 2025 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Wed, 08 Jan 2025 01:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 |
Wed, 08 Jan 2025 01:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
ssvc
|
ssvc
|
Thu, 12 Dec 2024 00:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-125 | |
| Metrics |
cvssV3_1
|
Wed, 11 Dec 2024 03:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-21T22:55:34.692Z
Reserved: 2024-12-08T00:00:00.000Z
Link: CVE-2024-55550
Updated: 2024-12-11T14:59:20.352Z
Status : Analyzed
Published: 2024-12-10T19:15:31.110
Modified: 2025-11-04T15:02:31.447
Link: CVE-2024-55550
No data.
OpenCVE Enrichment
No data.