{"uuid": "3611546f-7a82-4f8d-a175-3d027075527f", "vulnerability": {"vulnId": "CVE-2024-55550", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "3611546f-7a82-4f8d-a175-3d027075527f"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2025-01-07T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2025-01-07T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2025-01-07T00:00:00Z"}, "scope": {"notes": "KEV entry: Mitel MiCollab Path Traversal Vulnerability | Affected: Mitel / MiCollab | Description: Mitel MiCollab contains a path traversal vulnerability that could allow an authenticated attacker with administrative privileges to read local files within the system due to insufficient input sanitization. This vulnerability can be chained with CVE-2024-41713, which allows an unauthenticated, remote attacker to read arbitrary files on the server. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2025-01-28 | Known ransomware campaign use (KEV): Known | Notes (KEV): https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0029 ; https://nvd.nist.gov/vuln/detail/CVE-2024-55550"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-22"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "MiCollab", "due_date": "2025-01-28", "date_added": "2025-01-07", "vendorProject": "Mitel", "vulnerabilityName": "Mitel MiCollab Path Traversal Vulnerability", "knownRansomwareCampaignUse": "Known"}}], "references": [{"id": "CVE-2024-55550", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-55550"}]}
