{"uuid": "62f67979-026e-4c88-b25e-1ba32bbb5764", "vulnerability": {"vulnId": "CVE-2024-41710", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "62f67979-026e-4c88-b25e-1ba32bbb5764"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2025-02-12T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2025-02-12T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2025-02-12T00:00:00Z"}, "scope": {"notes": "KEV entry: Mitel SIP Phones Argument Injection Vulnerability | Affected: Mitel / SIP Phones | Description: Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, contain an argument injection vulnerability due to insufficient parameter sanitization during the boot process. Successful exploitation may allow an attacker to execute arbitrary commands within the context of the system. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2025-03-05 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin_24-0019-001-v2.pdf ; https://nvd.nist.gov/vuln/detail/CVE-2024-41710"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-88"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "SIP Phones", "due_date": "2025-03-05", "date_added": "2025-02-12", "vendorProject": "Mitel", "vulnerabilityName": "Mitel SIP Phones Argument Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-41710", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-41710"}]}
