
Cloud Vulnerability DB
A community-led vulnerabilities database
The AWV component of Mitel MiCollab before version 9.3 contains a security vulnerability (CVE-2021-32069) that could allow an attacker to perform a Man-In-The-Middle attack due to improper TLS negotiation. This vulnerability was disclosed on May 24, 2021 (Mitel Advisory).
The vulnerability stems from improper TLS negotiation in the AWV component. The CVSS v3.1 base score is 4.8 (Medium) with the following vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N. The vulnerability is tracked as CWE-295 (Improper Certificate Validation) (NVD).
A successful exploitation of this vulnerability could allow an attacker to view and modify data transmitted between the client and server through a Man-in-the-Middle attack (Mitel Advisory).
Mitel has released version 9.3 of MiCollab to address this vulnerability. Customers running affected versions (MiCollab 9.2 FP2 and earlier) are advised to update their software to the latest version (Mitel Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."