Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
A ransomware attack was deployed against an unnamed target, using Mitel’s VoIP appliance an entry point. CVE-2022-29499 is actively being used by attackers to achieve remote code execution and to gain initial access to their victim’s environment. The vulnerability is rated 9.8 in severity on the CVSS vulnerability scoring system.
In April 2022, Mitel fixed CVE-2022-29499 which affects the Mitel Service Appliance component of MiVoice Connect, but the fix did not work. According to Mitel, the bug allows attackers to perform remote code execution within the context of the Service Appliance. The following products are affected:
Discovered by CrowdStrike, CVE-2022-29499 includes two HTTP GET requests that are used to trigger remote code execution via fetching rogue commands from an attacker-controlled infrastructure. During CrowdStrike’s investigation, they observed an attacker using the exploit to create a reverse shell and using it to launch a web shell (“pdf_import.php”) on the VoIP appliance.
The attacker attempted to go undetected by performing anti-forensic techniques on the VoIP appliance - renaming the binary to “memdump”. The device that was observed by Crowdstrike was a Linux-based Mitel VoIP appliance sitting on the network perimeter, where EDR software for the device was highly limited.
Mitel is recommending that customers with affected product versions apply their suggested remediation immediately, as well as review the product Security Bulletin ID: 22-0002-001. If you have further questions regarding the vulnerability, you should contact Mitel’s Product Support.
Avertium recommends that you follow Mitel’s instructions for remediation of CVE-2022-29499. Mitel has provided a script for remediation. Customers are advised to apply the available remediation.
Novel Exploit in Mitel VOIP Appliance | CrowdStrike
security-bulletin_22-0002-001-v2.pdf (mitel.com)
Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack (thehackernews.com)
Mitel Product Security Advisory 22-0002
Related Reading: Flash Notice: Critical Confluence Zero-Day Vulnerability Exploited by Attackers
Contact us for more information about Avertium’s managed security service capabilities.