
Cloud Vulnerability DB
A community-led vulnerabilities database
The AWV and MiCollab Client Service components in Mitel MiCollab before version 9.3 contained a security vulnerability related to TLS session controls. The vulnerability was discovered and disclosed on August 13, 2021, affecting the MiCollab platform's security mechanisms (NVD, Mitel Advisory).
The vulnerability stems from insufficient TLS session controls that could be exploited by sending multiple session renegotiation requests. The vulnerability has been assigned a CVSS v3.1 base score of 3.7 (Low), with attack vector being Network-based, high attack complexity, requiring no privileges or user interaction, and affecting only integrity with low impact (NVD).
A successful exploitation of this vulnerability could allow an attacker to modify application data and state through a Man-in-the-Middle attack. The impact is primarily focused on data integrity, with no direct effect on confidentiality or availability (Mitel Advisory).
Mitel has addressed this vulnerability by releasing version 9.3 of MiCollab. Organizations using affected versions are strongly recommended to upgrade to version 9.3 or later to mitigate this security risk (Mitel Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."