The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Mitel Phone

Mitel 6970: code execution via Port Configuration Power On
An attacker can use a vulnerability via Port Configuration Power On of Mitel 6970, in order to run code...
20-0001, VIGILANCE-VUL-31398
Mitel SIP-DECT: Man-in-the-Middle
An attacker can act as a Man-in-the-Middle on Mitel SIP-DECT, in order to read or write data in the session...
CVE-2019-19891, MITEL-19-0009, VIGILANCE-VUL-31247
Mitel 6869i Voip Deskphone: code execution via tcp/49249
An attacker can use a vulnerability via tcp/49249 of Mitel 6869i Voip Deskphone, in order to run code...
bbs-2019.001, VIGILANCE-VUL-30009
Our database contains other pages. You can request a free trial to read them.

Display information about Mitel Phone: