Vulnerability Details : CVE-2022-26143
The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.
Vulnerability category: Denial of service
CVE-2022-26143
is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
MiCollab, MiVoice Business Express Access Control Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
A vulnerability has been identified in MiCollab and MiVoice Business Express that may allow a malicious actor to gain unauthorized access to sensitive information and services, cause performance degradations or a denial of service condition on the affected system.
Added on
2022-03-25
Action due date
2022-04-15
Exploit prediction scoring system (EPSS) score for CVE-2022-26143
Probability of exploitation activity in the next 30 days: 3.96%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 91 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-26143
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:C |
10.0
|
8.5
|
[email protected] |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
[email protected] |
CWE ids for CVE-2022-26143
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.Assigned by: [email protected] (Primary)
References for CVE-2022-26143
-
https://www.akamai.com/blog/security/phone-home-ddos-attack-vector
Mitigation;Third Party Advisory
-
https://blog.cloudflare.com/cve-2022-26143/
Mitigation;Third Party Advisory
-
https://team-cymru.com/blog/2022/03/08/record-breaking-ddos-potential-discovered-cve-2022-26143/
Mitigation;Third Party Advisory
-
https://www.shadowserver.org/news/cve-2022-26143-tp240phonehome-reflection-amplification-ddos-attack-vector/
Mitigation;Third Party Advisory
-
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-22-0001
Vendor Advisory
-
https://news.ycombinator.com/item?id=30614073
Issue Tracking;Third Party Advisory
-
https://arstechnica.com/information-technology/2022/03/ddosers-use-new-method-capable-of-amplifying-traffic-by-a-factor-of-4-billion/
Exploit;Press/Media Coverage;Third Party Advisory
Products affected by CVE-2022-26143
- cpe:2.3:a:mitel:micollab:*:*:*:*:*:-:*:*
- cpe:2.3:a:mitel:micollab:9.4:-:*:*:*:-:*:*
- cpe:2.3:a:mitel:micollab:9.4:sp1:*:*:*:-:*:*
- cpe:2.3:a:mitel:mivoice_business_express:*:*:*:*:*:*:*:*