Vulnerability Details : CVE-2019-7256
Public exploit exists!
Linear eMerge E3-Series devices allow Command Injections.
Products affected by CVE-2019-7256
- cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:nortekcontrol:linear_emerge_elite_firmware:*:*:*:*:*:*:*:*
CVE-2019-7256 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Nice Linear eMerge E3-Series OS Command Injection Vulnerability
CISA required action:
Contact the vendor for guidance on remediating firmware, per their advisory.
CISA description:
Nice Linear eMerge E3-Series contains an OS command injection vulnerability that allows an attacker to conduct remote code execution.
Notes:
https://linear-solutions.com/wp-content/uploads/E3-Bulletin-06-27-2023.pdf, https://www.cisa.gov/news-events/ics-advisories/icsa-24-065-01; https://nvd.nist.gov/vuln/detail/CVE-2019-7256
Added on
2024-03-25
Action due date
2024-04-15
Exploit prediction scoring system (EPSS) score for CVE-2019-7256
94.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2019-7256
-
Linear eMerge E3-Series Access Controller Command Injection
Disclosure Date: 2019-10-29First seen: 2023-09-11exploit/linux/http/linear_emerge_unauth_rce_cve_2019_7256This module exploits a command injection vulnerability in the Linear eMerge E3-Series Access Controller. The Linear eMerge E3 versions `1.00-06` and below are vulnerable to unauthenticated command injection in card_scan_decoder.php via the `No` and `door` HTTP GET par
CVSS scores for CVE-2019-7256
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2024-07-03 |
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | 2024-08-13 |
CWE ids for CVE-2019-7256
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2019-7256
-
http://packetstormsecurity.com/files/155255/Linear-eMerge-E3-1.00-06-card_scan.php-Command-Injection.html
Linear eMerge E3 1.00-06 card_scan.php Command Injection ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://packetstormsecurity.com/files/170372/Linear-eMerge-E3-Series-Access-Controller-Command-Injection.html
Exploit;Third Party Advisory;VDB Entry
-
https://applied-risk.com/labs/advisories
Resources - Applied RiskNot Applicable
-
http://packetstormsecurity.com/files/155272/Linear-eMerge-E3-Access-Controller-Command-Injection.html
Linear eMerge E3 Access Controller Command Injection ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://www.applied-risk.com/resources/ar-2019-005
Nortek Linear eMerge E3-Series Multiple Vulnerabilities Nortek Linear eMerge E3-Series Multiple Vulnerabilities - Applied RiskThird Party Advisory
-
http://packetstormsecurity.com/files/155256/Linear-eMerge-E3-1.00-06-card_scan_decoder.php-Command-Injection.html
Linear eMerge E3 1.00-06 card_scan_decoder.php Command Injection ≈ Packet StormExploit;Third Party Advisory;VDB Entry
Jump to