Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47912: n/a

0
High
VulnerabilityCVE-2024-47912cvecve-2024-47912
Published: Mon Oct 21 2024 (10/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A vulnerability in the AWV (Audio, Web, and Video) Conferencing component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to perform unauthorized data-access attacks due to missing authentication mechanisms. A successful exploit could allow an attacker to access and delete sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:35:11 UTC

Technical Analysis

CVE-2024-47912 is a vulnerability identified in the AWV (Audio, Web, and Video) Conferencing component of Mitel MiCollab software versions through 9.8 SP1 FP2 (9.8.1.201). The root cause is the absence of proper authentication mechanisms, classified under CWE-306 (Missing Authentication for Critical Function). This flaw allows an unauthenticated attacker to remotely access the conferencing component without any credentials or user interaction. Once exploited, the attacker can perform unauthorized data-access attacks, including reading and deleting sensitive information managed or transmitted by the conferencing system. The vulnerability affects the confidentiality and integrity of data but does not impact availability directly. The CVSS v3.1 base score is 8.2, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, high confidentiality impact, low integrity impact, and no availability impact. No public exploit code or active exploitation has been reported yet, but the severity and ease of exploitation make this a critical concern for organizations using Mitel MiCollab for unified communications and collaboration. The lack of authentication on a critical conferencing component could allow attackers to compromise sensitive communications and data, potentially leading to data breaches or operational disruptions.

Potential Impact

The vulnerability poses a significant risk to organizations worldwide that use Mitel MiCollab for audio, web, and video conferencing. Unauthorized access to sensitive communications and data can lead to data breaches, loss of intellectual property, exposure of confidential business or government information, and potential compliance violations. The ability to delete data further increases the risk of operational disruption and data integrity loss. Since the vulnerability requires no authentication or user interaction, attackers can exploit it remotely and at scale, potentially targeting multiple organizations simultaneously. This could undermine trust in Mitel’s conferencing solutions and impact critical communications infrastructure, especially in sectors such as government, finance, healthcare, and large enterprises where secure collaboration is essential. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation due to the high severity and ease of exploitation.

Mitigation Recommendations

Organizations should immediately assess their use of Mitel MiCollab versions up to 9.8 SP1 FP2 and plan to upgrade to a patched version once available. In the absence of official patches, network-level mitigations should be implemented, such as restricting access to the AWV Conferencing component to trusted internal networks only, using firewalls and segmentation to limit exposure. Deploying intrusion detection and prevention systems (IDS/IPS) with signatures or anomaly detection for suspicious access attempts to the conferencing service can help detect exploitation attempts. Monitoring logs for unauthorized access or deletion activities is critical. Additionally, organizations should review and tighten access controls around conferencing infrastructure and consider multi-factor authentication for administrative interfaces. Engaging with Mitel support for guidance and applying any recommended temporary workarounds is advised. Finally, organizations should educate their security teams about this vulnerability to ensure rapid response if exploitation attempts are detected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d09b7ef31ef0b56d64c

Added to database: 2/25/2026, 9:43:37 PM

Last enriched: 2/28/2026, 7:35:11 AM

Last updated: 4/12/2026, 12:21:10 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses