Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems

Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems

Posted on July 24, 2025July 24, 2025 By CWS

Jul 24, 2025Ravie LakshmananVulnerability / Community Safety
Mitel has launched safety updates to deal with a important safety flaw in MiVoice MX-ONE that might permit an attacker to bypass authentication protections.
“An authentication bypass vulnerability has been recognized within the Provisioning Supervisor part of Mitel MiVoice MX-ONE, which, if efficiently exploited, might permit an unauthenticated attacker to conduct an authentication bypass assault on account of improper entry management,” the corporate stated in an advisory launched Wednesday.
“A profitable exploit of this vulnerability might permit an attacker to realize unauthorized entry to person or admin accounts within the system.”

The shortcoming, which is but to be assigned a CVE identifier, carries a CVSS rating of 9.4 out of a most of 10.0. It impacts MiVoice MX-ONE variations from 7.3 (7.3.0.0.50) to 7.8 SP1 (7.8.1.0.14).
Patches for the problem have been made out there in MXO-15711_78SP0 and MXO-15711_78SP1 for MX-ONE variations 7.8 and seven.8 SP1, respectively. Clients utilizing MiVoice MX-ONE model 7.3 and above are really helpful to submit a patch request to their licensed service companion.
As mitigations till fixes may be utilized, it is suggested to restrict direct publicity of MX-ONE companies to the general public web and be sure that they’re positioned inside a trusted community.
Together with the authentication bypass flaw, Mitel has shipped updates to resolve a high-severity vulnerability in MiCollab (CVE-2025-52914, CVSS rating: 8.8) that, if efficiently exploited, might allow an authenticated attacker to hold out an SQL injection assault.
“A profitable exploit might permit an attacker to entry person provisioning info and execute arbitrary SQL database instructions with potential impacts on the confidentiality, integrity, and availability of the system,” Mitel stated.

The vulnerability, which impacts MiCollab variations 10.0 (10.0.0.26) to 10.0 SP1 FP1 (10.0.1.101) and 9.8 SP3 (9.8.3.1) and earlier, has been resolved in variations 10.1 (10.1.0.10), 9.8 SP3 FP1 (9.8.3.103), and later.
With shortcomings in Mitel gadgets coming beneath energetic assaults up to now, it is important that customers transfer rapidly to replace their installations as quickly as attainable to mitigate potential threats.

The Hacker News Tags:Access, Bypass, Critical, Flaw, Full, Gain, Hackers, Lets, Login, Mitel, MiVoice, MXONE, Systems

Post navigation

Previous Post: Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments
Next Post: SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups

Related Posts

Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord The Hacker News
Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks Samsung Fixes Critical Zero-Day CVE-2025-21043 Exploited in Android Attacks The Hacker News
Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack Active Exploits Hit Dassault and XWiki — CISA Confirms Critical Flaws Under Attack The Hacker News
OpenAI Addresses Malicious Axios Incident in macOS Apps OpenAI Addresses Malicious Axios Incident in macOS Apps The Hacker News
ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services The Hacker News
German Agencies Issue Alert on Signal Phishing Threat German Agencies Issue Alert on Signal Phishing Threat The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark