Mitel warns the critical security flaw could allow hackers to completely bypass connections


  • A BUG in MIVIIC MX-ONE granted administrative access
  • Vulnerability to Micollab allows an arbitrary order execution
  • The fixes have been published for both, so users should update now

Mitel Networks has corrected two important vulnerabilities in its products which could be mistreated to obtain administrative access and deploy malicious code on compromise termination points.

In a security notice, Mitel said that he had discovered a lack of bypassing the authentication of critical severity in Mixic MX-One, his Unified Communications & Collaboration (UCC) platform (UCC) of business quality. MX-ONE is designed to go from hundreds to more than 100,000 users in a single distributed or centralized SIP system, and supports cloud deployments on pre-assessments and private / public.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top