MiCollab 未授权访问漏洞
漏洞信息
漏洞名称: MiCollab 未授权访问漏洞
漏洞编号:
- CVE: CVE-2025-52914
漏洞类型: 未授权访问
漏洞等级: 高危
漏洞描述: MiCollab是Mitel公司提供的一款企业级协作解决方案,广泛应用于各种规模的企业中,支持即时消息、视频会议和文件共享等功能,旨在提高团队协作效率。该产品在企业内部网络和云环境中均有部署,因其功能全面和易用性而受到许多组织的青睐。此次发现的漏洞属于未授权访问类型,攻击者无需认证即可利用该漏洞访问系统资源。技术根源在于系统对用户访问控制的缺失或不当配置,使得攻击者能够绕过正常的认证流程,直接访问或操作受保护的资源。这种漏洞的存在可能导致敏感信息泄露、服务中断或其他恶意操作,严重威胁企业数据安全和业务连续性。由于漏洞利用无需用户交互,攻击者可以自动化地扫描和攻击存在漏洞的系统,增加了被大规模利用的风险。企业应立即检查并更新MiCollab至最新版本,或应用供应商提供的安全补丁,以防止潜在的安全威胁。
产品厂商: Mitel
产品名称: MiCollab
影响版本: version < 98301 || (version >= 10000026 && version <= 100010101)
来源: https://github.com/rxerium/CVE-2025-52914
类型: CVE-2025:github search
仓库文件
- README.md
- template.yaml
来源概述
CVE-2025-52914
How does this detection method work?
Versions are inferred from the below link in the html body:
1 |
|
Specifically the MiCollab%2010.0
which, for example, infers the remote host is using version 10.0
. The extracted version is then compared matched against known vulnerable instances through DSL matchers:
1 |
|
How do I run this script?
- Download Nuclei from here
- Copy the template to your local system
- Run the following command:
nuclei -u https://yourHost.com -t template.yaml
References
- https://nvd.nist.gov/vuln/detail/CVE-2025-52914
- https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0008
Disclaimer
Use at your own risk, I will not be responsible for illegal activities you conduct on infrastructure you do not own or have permission to scan.
Contact
Feel free to reach out to me on Signal if you have any questions.