{"api_version":"1","generated_at":"2026-04-22T23:31:21+00:00","cve":"CVE-2023-31459","urls":{"html":"https://cve.report/CVE-2023-31459","api":"https://cve.report/api/cve/CVE-2023-31459.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-31459","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-31459"},"summary":{"title":"CVE-2023-31459","description":"A vulnerability in the Connect Mobility Router component of Mitel MiVoice Connect versions 9.6.2208.101 and earlier could allow an unauthenticated attacker with internal network access to authenticate with administrative privileges, because the initial installation does not enforce a password change. A successful exploit could allow an attacker to make arbitrary configuration changes and execute arbitrary commands.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-05-24 20:15:00","updated_at":"2023-06-01 16:10:00"},"problem_types":["CWE-640"],"metrics":[],"references":[{"url":"https://www.mitel.com/support/security-advisories","name":"https://www.mitel.com/support/security-advisories","refsource":"MISC","tags":[],"title":"Security Advisories","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0006","name":"https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0006","refsource":"MISC","tags":[],"title":"Mitel Product Security Advisory 23-0006","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-31459","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-31459","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"31459","vulnerable":"1","versionEndIncluding":"9.6.2208.101","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"mivoice_connect","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-31459","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability in the Connect Mobility Router component of Mitel MiVoice Connect versions 9.6.2208.101 and earlier could allow an unauthenticated attacker with internal network access to authenticate with administrative privileges, because the initial installation does not enforce a password change. A successful exploit could allow an attacker to make arbitrary configuration changes and execute arbitrary commands."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.mitel.com/support/security-advisories","refsource":"MISC","name":"https://www.mitel.com/support/security-advisories"},{"refsource":"MISC","name":"https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0006","url":"https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0006"}]}},"nvd":{"publishedDate":"2023-05-24 20:15:00","lastModifiedDate":"2023-06-01 16:10:00","problem_types":["CWE-640"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mitel:mivoice_connect:*:*:*:*:*:*:*:*","versionEndIncluding":"9.6.2208.101","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}