- CISA adds three new bugs to KEV: two in Mitel’s MiCollab and one in Oracle WebLogic Server
- The bugs allowed criminals to read sensitive files and take over vulnerable endpoints.
- Federal agencies have until the end of January 2025 to implement the patch.
The US Cybersecurity and Infrastructure Security Agency (CISA) HAS added three new flaws to its Catalog of Exploited Vulnerabilities (KEV), indicating abuse in the wild and giving federal agencies a deadline to fix the things.
Two of the three flaws are in Mitel’s MiCollab unified communications platform. One is a critical path traversal vulnerability, tracked as CVE-2024-41713.
By abusing this bug, threat actors can execute management actions and access user and network information.
A deadline to patch
“Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access, with potential impacts to system confidentiality, integrity, and availability. This vulnerability can be exploited without authentication,” MiCollab said.
“If the vulnerability is successfully exploited, an attacker could gain unauthenticated access to provisioning information, including non-sensitive user and network information, and perform unauthorized administrative actions on the MiCollab server.”
The second bug is tracked as CVE-2024-55550, another path traversal vulnerability that grants administrator privileges. However, the impact of this bug is limited as it does not allow threat actors to escalate privileges or access files with sensitive information. Therefore, the severity of this bug was assigned to “medium”: 4.4/10.
The third bug is found in Oracle WebLogic Server and is tracked as CVE-2020-2883. It was patched in April 2020 and gives threat actors the ability to remotely access vulnerable endpoints.
Now, with the three vulnerabilities added to KEV, federal agencies have until January 28 to apply fixes or stop using the products altogether. 8. “These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise,” CISA said.
Mitel’s MiCollab is a popular unified communications platform and, as such, a major target for cybercriminals. In early December of this year, the company patched a three-month-old zero-day vulnerability that allowed criminals to read sensitive files.
Through beepcomputer