CVE-2025-67822
BaseFortify
Publication date: 2026-01-15
Last updated on: 2026-01-16
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mitel | mivoice_mx-one | From 7.3 (inc) to 7.8.1.0.14 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an authentication bypass flaw in the Provisioning Manager component of Mitel MiVoice MX-ONE versions 7.3 through 7.8 SP1. Due to improper access control, an unauthenticated attacker can bypass authentication mechanisms and gain unauthorized access to user or administrative accounts within the system. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability allows an attacker to gain unauthorized access to user or admin accounts, potentially compromising confidentiality, integrity, and availability of the system. This could lead to unauthorized data access, modification, or disruption of services. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate steps to mitigate CVE-2025-67822 include applying the patches MXO-15711_78SP0 and MXO-15711_78SP1 for MX-ONE versions 7.8 and 7.8 SP1 respectively. For versions 7.3 and above, customers should request patches through authorized service partners. Additionally, Mitel advises against exposing MX-ONE services directly to the public internet, recommends deploying the system within trusted networks, and suggests restricting access to or disabling the Provisioning Manager service entirely. Detailed instructions are available in Mitelβs Knowledge Management System. [1]