CVE-2025-67822
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-15

Last updated on: 2026-01-16

Assigner: MITRE

Description
A vulnerability in the Provisioning Manager component of Mitel MiVoice MX-ONE 7.3 (7.3.0.0.50) through 7.8 SP1 (7.8.1.0.14) could allow an unauthenticated attacker to conduct an authentication bypass attack due to improper authentication mechanisms. A successful exploit could allow an attacker to gain unauthorized access to user or admin accounts in the system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-15
Last Modified
2026-01-16
Generated
2026-05-07
AI Q&A
2026-01-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mitel mivoice_mx-one From 7.3 (inc) to 7.8.1.0.14 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an authentication bypass flaw in the Provisioning Manager component of Mitel MiVoice MX-ONE versions 7.3 through 7.8 SP1. Due to improper access control, an unauthenticated attacker can bypass authentication mechanisms and gain unauthorized access to user or administrative accounts within the system. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability allows an attacker to gain unauthorized access to user or admin accounts, potentially compromising confidentiality, integrity, and availability of the system. This could lead to unauthorized data access, modification, or disruption of services. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate steps to mitigate CVE-2025-67822 include applying the patches MXO-15711_78SP0 and MXO-15711_78SP1 for MX-ONE versions 7.8 and 7.8 SP1 respectively. For versions 7.3 and above, customers should request patches through authorized service partners. Additionally, Mitel advises against exposing MX-ONE services directly to the public internet, recommends deploying the system within trusted networks, and suggests restricting access to or disabling the Provisioning Manager service entirely. Detailed instructions are available in Mitel’s Knowledge Management System. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart