Mitel MiCollab Vulnerabilities: A Comedy of Errors in Cybersecurity Patching
Mitel MiCollab is facing a zero-day arbitrary file read vulnerability, which can be combined with a patched critical bug for unauthorized access. Despite a promised fix, the flaw remains unpatched after 100 days. WatchTowr’s proof-of-concept exploit spotlights the urgency for Mitel to address the vulnerability.

Hot Take:
In the world of cybersecurity, Mitel seems to be playing a game of “Whack-a-Mole,” where every patch is like hitting one problem on the head while two more pop up. If only they could patch the holes in their timeline as quickly as they do in their software! Meanwhile, watchTowr is out here doing all the heavy lifting and Mitel’s comment game is as quiet as a ninja in slippers. Somebody pass them a megaphone!
Key Points:
- A zero-day vulnerability in Mitel MiCollab can be chained with a critical bug for unauthorized file access.
- WatchTowr disclosed these vulnerabilities to Mitel, who took over 100 days to address them.
- A proof-of-concept exploit was published by watchTowr after a long wait for Mitel’s patch.
- Mitel MiCollab is a widely-used enterprise collaboration tool, making it a target for cybercriminals.
- The vulnerabilities include SQL injection and authentication bypass issues in the NPM component.
Already a member? Log in here