Mitel networks reports critical authentication bypass flaw in MiVoice MX-ONE
Take action: If you have Mitel MiVoice MX-ONE or MiCollab systems, make sure they are isolated from the internet since attackers can bypass authentication and gain admin access without any credentials. Apply the available patches away - for MX-ONE versions 7.8/7.8 SP1 use patches MXO-15711_78SP0/MXO-15711_78SP1, and upgrade MiCollab to version 10.1 or 9.8 SP3 FP1 or later.
Learn More
Mitel Networks is reporting a critical security vulnerability affecting its MiVoice MX-ONE enterprise communications platform that could allow unauthenticated attackers to bypass authentication protections and gain unauthorized access to administrative accounts.
The primary vulnerability
Vulnerabilities summary:
- MISA-2025-0009, no CVE code (CVSS score 9.4) - Authentication Bypass in MiVoice MX-ONE caused by from improper access control mechanisms that fail to adequately validate user permissions
- MISA-2025-0009 (CVSS score 8.8) - SQL Injection in MiCollab. It allows authenticated attackers to execute arbitrary SQL database command
Affected Versions:
The authentication bypass vulnerability affects MiVoice MX-ONE versions ranging from 7.3 (7.3.0.0.50) through 7.8 SP1 (7.8.1.0.14).
The SQL injection flaw affects MiCollab versions 10.0 (10.0.0.26) through 10.0 SP1 FP1 (10.0.1.101) and version 9.8 SP3 (9.8.3.1) and earlier.
Available Patches:
- MiVoice MX-ONE version 7.8 apply patch MXO-15711_78SP0,
- MiVoice MX-ONE version 7.87.8 SP1 apply patch MXO-15711_78SP1.
- For customers operating older versions from 7.3 and above, Mitel requires submitting a patch request through authorized service partners, with patches made available at the company's discretion.
Mitel has resolved the SQL Injection issue in versions 10.1 (10.1.0.10), 9.8 SP3 FP1 (9.8.3.103), and later releases.
For organizations unable to immediately apply patches, Mitel recommends isolating the platform from the public internet and accessible only within trusted network environments. Organizations can reduce risk by restricting access to the Provisioning Manager service entirely, via specific instructions available in Mitel's knowledge management system.