CVE-2019-7252

9.8 CRITICAL

📋 TL;DR

Linear eMerge E3-Series access control systems have hardcoded default credentials that cannot be changed. This allows attackers to gain administrative access to physical security systems, affecting organizations using these devices for building access control.

💻 Affected Systems

Products:
  • Linear eMerge E3-Series
Versions: All versions prior to patching
Operating Systems: Embedded system
Default Config Vulnerable: ⚠️ Yes
Notes: Hardcoded credentials cannot be changed by administrators, making all default installations vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete physical security compromise allowing unauthorized building access, door control manipulation, and potential physical harm or theft.

🟠

Likely Case

Unauthorized access to secure areas, door lock manipulation, and surveillance system access.

🟢

If Mitigated

Limited impact if devices are isolated on separate networks with strict access controls.

🌐 Internet-Facing: HIGH - Devices exposed to internet can be directly compromised with minimal effort.
🏢 Internal Only: HIGH - Even internally, default credentials allow easy privilege escalation.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attackers can use default credentials documented in public advisories to gain admin access without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact vendor for specific firmware updates

Vendor Advisory: https://www.linearcorp.com/support/security-advisories

Restart Required: Yes

Instructions:

1. Contact Linear support for latest firmware. 2. Backup configuration. 3. Apply firmware update. 4. Change all default credentials. 5. Restart devices.

🔧 Temporary Workarounds

Network segmentation

all

Isolate eMerge devices on separate VLAN with strict firewall rules

Access control lists

all

Implement IP-based restrictions to limit management interface access

🧯 If You Can't Patch

  • Segment devices on isolated network with no internet access
  • Implement strict firewall rules allowing only authorized management IPs

🔍 How to Verify

Check if Vulnerable:

Attempt to login to web interface using default credentials documented in advisory

Check Version:

Check firmware version in device web interface or contact vendor

Verify Fix Applied:

Verify default credentials no longer work and new strong credentials are required

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts followed by successful admin login
  • Multiple authentication attempts from single source

Network Indicators:

  • Unauthorized access to management ports (typically 80/443)
  • Traffic to/from unexpected IP addresses

SIEM Query:

source_ip="*" AND (event_type="authentication" AND result="success") AND user="admin" AND device_type="eMerge"

🔗 References

📤 Share & Export