Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47189: n/a

0
High
VulnerabilityCVE-2024-47189cvecve-2024-47189
Published: Mon Oct 21 2024 (10/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

The API Interface of the AWV (Audio, Web and Video Conferencing) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct SQL injection due to insufficient sanitization of user input. A successful exploit could allow an attacker with knowledge of specific details to access non-sensitive user provisioning information and execute arbitrary SQL database commands.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:33:25 UTC

Technical Analysis

CVE-2024-47189 is a SQL injection vulnerability identified in the API interface of the AWV component of Mitel MiCollab, a unified communications platform widely used for audio, web, and video conferencing. The vulnerability exists due to improper sanitization of user-supplied input in API requests, which allows an unauthenticated attacker to inject malicious SQL commands. This flaw affects versions up to 9.8 SP1 FP2 (9.8.1.201). Exploiting this vulnerability does not require authentication or user interaction but does require the attacker to have knowledge of specific API details to craft effective injection payloads. Successful exploitation can lead to unauthorized reading of non-sensitive user provisioning information and execution of arbitrary SQL commands, potentially altering or deleting data and impacting database availability. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The CVSS v3.1 base score is 7.7, indicating high severity, with a network attack vector, high attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported, the vulnerability poses a significant threat to the confidentiality, integrity, and availability of affected systems. Mitel has not yet published a patch or mitigation guidance at the time of this report, so organizations must monitor for updates and consider interim protective measures.

Potential Impact

The impact of CVE-2024-47189 is substantial for organizations using vulnerable versions of Mitel MiCollab. An attacker exploiting this vulnerability can execute arbitrary SQL commands on the backend database, potentially leading to unauthorized disclosure of user provisioning data, which, while non-sensitive, could aid in further attacks or reconnaissance. More critically, the attacker can modify or delete data, compromising database integrity and availability, which could disrupt communication services reliant on MiCollab. Such disruption could affect business continuity, especially in organizations heavily dependent on unified communications for daily operations. The vulnerability's unauthenticated nature increases risk, as attackers do not need valid credentials to exploit it. This could facilitate automated attacks or exploitation by external threat actors. The absence of known exploits currently limits immediate widespread impact, but the vulnerability remains a significant risk until patched. Organizations in sectors such as finance, healthcare, government, and large enterprises using Mitel MiCollab are particularly vulnerable to operational disruption and potential data integrity issues.

Mitigation Recommendations

1. Immediate monitoring for official patches or security advisories from Mitel is critical; apply any released updates promptly. 2. In the absence of patches, implement strict network segmentation and firewall rules to restrict access to the AWV API interface only to trusted internal networks and authorized personnel. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the AWV API endpoints. 4. Conduct thorough input validation and sanitization on all API inputs at the application layer if possible, or deploy proxy solutions that can enforce such controls. 5. Monitor logs and network traffic for unusual or suspicious API requests that may indicate exploitation attempts. 6. Limit database permissions for the MiCollab application to the minimum necessary to reduce the impact of potential SQL injection. 7. Educate IT and security teams about this vulnerability to ensure rapid detection and response. 8. Consider temporary disabling or restricting the AWV API interface if it is not essential to business operations until a patch is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-20T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d06b7ef31ef0b56d50b

Added to database: 2/25/2026, 9:43:34 PM

Last enriched: 2/28/2026, 7:33:25 AM

Last updated: 4/12/2026, 1:56:41 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses