Security

Mitel 0-day, 5-year-old Oracle RCE bug under active exploit

3 CVEs added to CISA's catalog


Cybercriminals are actively exploiting two vulnerabilities in Mitel MiCollab, including a zero-day flaw – and a critical remote code execution vulnerability in Oracle WebLogic Server that has been abused for at least five years.

Here are the three, all of which the US Cybersecurity and Infrastructure Security Agency (CISA) added to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation:

Two of the three – Mitel's CVE-2024-41713, and Oracle's CVE-2020-2883 – have been fixed by the respective vendors, while CVE-2024-55550 remains in flux; security researchers have sounded warnings for months about these Mitel bugs and for years about Oracle's.

It goes without saying, but if you haven't already: Get patching ASAP, if you can. Miscreants have a head start in this race.

The two Mitel flaws affect the vendor's MiCollab product in versions 9.8 SP1 FP2 (9.8.1.201) and earlier. Both are path traversal vulnerabilities, with one (CVE-2024-41713) receiving a critical 9.8 CVSS rating and the other (CVE-2024-55550) a low-severity 2.7 score.

MiCollab is a widely used enterprise collaboration tool with a range of features including voice, video, chat messaging, SMS, web conferencing and file sharing. 

The critical CVE affects the NuPoint Unified Messaging (NPM) component of MiCollab due to insufficient input validation. An unauthenticated attacker can abuse this hole to conduct a path traversal attack and view, corrupt, or delete users' data and system configurations. Mitel fixed this one in October.

Just last month, Mitel added the second, low-severity vulnerability to the same security advisory after bug hunters at watchTowr published a proof-of-concept (PoC) demonstrating how these flaws could be chained together potentially for a more significant impact.

At the time, CVE-2024-55550 did not have a fix or a CVE assigned to it. It now has a CVE but still no fix: "CVE-2024-55550, is substantially mitigated by MiCollab 9.8 SP2 (9.8.2.12)," according to Mitel's December 12 security advisory update. "This low severity issue will be addressed in future product updates."

Mitel credited watchTowr's Sonny Macdonald with spotting and reporting both vulnerabilities, and the watchTowr team said they waited more than 100 days for the enterprise software vendor to issue a fix before going public with the PoC.

While we don't know who is abusing these flaws, and to what purposes — CISA says it's "unknown" if either has been used in ransomware campaigns — watchTowr CEO Benjamin Harris told The Register that this type of software is especially attractive to government-backed snoops.

"VoIP platforms are juicy targets for an APT, creating the opportunity to listen in on calls, interfere with them or even block them at will," Harris said. "We're glad we were able to alert industry to these vulnerabilities and their impact well ahead of CISA marking them as KEV, given our evaluation that they would likely receive real-world threat actor attention."

A Mitel spokesperson declined to answer The Register’s specific questions, and told us the company doesn’t comment on instances of abuse.

“Our top priority is to ensure the reliability and security of the solutions we offer our customers,” the spokesperson said. “We recently became aware of vulnerabilities relating to MiCollab and have published recommended actions, including software updates, to mitigate risks. We strongly encourage customers to apply all available security updates as they become available.”

Oracle RCE under exploit … five years later

The five-year-old Oracle flaw, CVE-2020-2883, also received a critical, 9.8 CVSS score. 

According to CISA: "Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an unspecified vulnerability exploitable by an unauthenticated attacker with network access via IIOP or T3."

The database giant fixed this vulnerability in April 2020. Viettel Cyber Security researcher Bui Duong, via Trend Micro's Zero Day Initiative, reported this vulnerability, which allowed attackers to bypass a previous bug (CVE-2020-2555). 

Also back in 2020, Oracle and CISA warned that CVE-2020-2883 was being exploited in the wild. 

Oracle did not immediately respond to The Register's questions about this flaw, including the scope of the current exploits. ®

Editor's note: This story was amended post-publication with comment from Mitel.

Send us news
4 Comments

Ghost ransomware crew continues to haunt IT depts with scarily bad infosec

FBI and CISA issue reminder - deep sigh - about the importance of patching and backups

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Snake Keylogger slithers into Windows, evades detection with AutoIt-compiled payload

Because stealing your credentials, banking info, and IP just wasn’t enough

200-plus impressively convincing GitHub repos are serving up malware

Plus: DOGE staff quit; LastPass PC, Mac gasp; and CISA warns Oracle and Adobe flaws under attack

Oracle extends 19c database support to 2032, making it 'longest strategic release'

Meanwhile, on-prem version of 23ai remains uncertain