Article Details
Scrape Timestamp (UTC): 2025-01-08 20:33:16.910
Source: https://www.theregister.com/2025/01/08/mitel_0_day_oracle_rce_under_exploit/
Original Article Text
Click to Toggle View
Mitel 0-day, 5-year-old Oracle RCE bugs under active exploit. 3 CVEs added to CISA's catalog. Cybercriminals are actively exploiting two vulnerabilities in Mitel MiCollab, including a zero-day flaw, alongside a critical remote code execution vulnerability in Oracle WebLogic Server that has been exploited for at least five years. Here are the three, all of which the US Cybersecurity and Infrastructure Security Agency (CISA) added to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation: Two of the three have been fixed by the respective vendors, but security researchers have sounded warnings for months about the Mitel bugs and for years about Oracle's. It goes without saying, but if you haven't already: get patching ASAP. Miscreants have a head start in this race. The two Mitel flaws affect the vendor's MiCollab product in versions 9.8 SP1 FP2 (9.8.1.201) and earlier. Both are path traversal vulnerabilities, with one (CVE-2024-41713) receiving a critical, 9.8 CVSS rating and the other (CVE-2024-55550) a low-severity, 2.7 score. MiCollab is a widely used enterprise collaboration tool with a range of features including voice, video, chat messaging, SMS, web conferencing and file sharing. The critical CVE affects the NuPoint Unified Messaging (NPM) component of MiCollab due to insufficient input validation. An unauthenticated attacker can abuse this hole to conduct a path traversal attack and view, corrupt, or delete users' data and system configurations. Mitel fixed this one in October. Just last month, Mitel added the second, low-severity vulnerability to the same security advisory after bug hunters at watchTowr published a proof-of-concept (PoC) demonstrating how these flaws could be chained together potentially for a more significant impact. At the time, CVE-2024-55550 did not have a fix or a CVE assigned to it. It now has a CVE but still no fix: "CVE-2024-55550, is substantially mitigated by MiCollab 9.8 SP2 (9.8.2.12)," according to Mitel's December 12 security advisory update. "This low severity issue will be addressed in future product updates." Mitel credited watchTowr's Sonny Macdonald with spotting and reporting both vulnerabilities, and the watchTowr team said they waited more than 100 days for the enterprise software vendor to issue a fix before going public with the PoC. While we don't know who is abusing these flaws, and to what purposes — CISA says it's "unknown" if either has been used in ransomware campaigns — watchTowr CEO Benjamin Harris told The Register that this type of software is especially attractive to government-backed snoops. "VoIP platforms are juicy targets for an APT, creating the opportunity to listen in on calls, interfere with them or even block them at will," Harris said. "We're glad we were able to alert industry to these vulnerabilities and their impact well ahead of CISA marking them as KEV, given our evaluation that they would likely receive real-world threat actor attention." Mitel did not immediately respond to The Register's inquiries. Oracle RCE under exploit … five years later The five-year-old Oracle flaw, CVE-2020-2883, also received a critical, 9.8 CVSS score. According to CISA: "Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an unspecified vulnerability exploitable by an unauthenticated attacker with network access via IIOP or T3." The database giant fixed this vulnerability in April 2020. Viettel Cyber Security researcher Bui Duong, via Trend Micro's Zero Day Initiative, reported this vulnerability, which allowed attackers to bypass a previous bug (CVE-2020-2555). Also back in 2020, Oracle and CISA warned that CVE-2020-2883 was being exploited in the wild. Oracle did not immediately respond to The Register's questions about this flaw, including the scope of the current exploits.
Daily Brief Summary
Cybercriminals are exploiting two vulnerabilities in Mitel MiCollab and a critical flaw in Oracle WebLogic Server.
The US Cybersecurity and Infrastructure Security Agency (CISA) recently added three CVEs to its Known Exploited Vulnerabilities Catalog due to evidence of active exploits.
The Mitel vulnerabilities are path traversal issues, with one rated as critical (CVE-2024-41713) and the other as low-severity (CVE-2024-55550); the critical flaw has been patched.
Oracle's CVE-2020-2883, exploitable through WebLogic Server, has been under active exploitation since its discovery five years ago, despite being patched.
Mitel's lower-severity CVE-2024-55550 remains unpatched but is considered mitigated in newer software versions.
Security researchers have highlighted these vulnerabilities, stressing the potential use of such flaws by advanced persistent threats (APTs) to manipulate or access sensitive communications.
Enterprises using affected products are strongly advised to apply all available security updates and monitor for possible exploitation signs.
Both Mitel and Oracle did not respond promptly to inquiries about these security issues, highlighting ongoing concerns around communication and transparency in cybersecurity incident response.