CVE-2019-7256
📋 TL;DR
CVE-2019-7256 is a command injection vulnerability in Linear eMerge E3-Series access control devices that allows attackers to execute arbitrary commands on the system. This affects organizations using these physical security devices for building access control. Attackers can potentially gain full control of the access controller system.
💻 Affected Systems
- Linear eMerge E3-Series Access Controllers
📦 What is this software?
Linear Emerge Elite Firmware by Nortekcontrol
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of access control system allowing attackers to unlock doors, disable security systems, pivot to internal networks, and maintain persistent access to physical facilities.
Likely Case
Unauthorized access to building areas, potential data theft from connected systems, and disruption of physical security operations.
If Mitigated
Limited impact if devices are properly segmented and monitored, though physical security could still be compromised.
🎯 Exploit Status
Multiple public exploit scripts exist. The vulnerability requires no authentication and has simple exploitation vectors via HTTP requests.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Contact Linear (now Nortek Security & Control) for updated firmware
Vendor Advisory: https://applied-risk.com/labs/advisories
Restart Required: Yes
Instructions:
1. Contact Linear/Nortek for latest firmware. 2. Backup current configuration. 3. Apply firmware update via web interface or console. 4. Verify update and restore configuration if needed. 5. Test system functionality.
🔧 Temporary Workarounds
Network Segmentation
allIsolate access controllers from internet and restrict network access
Web Interface Restriction
linuxBlock access to vulnerable PHP files via web server configuration
LocationMatch "^/card_scan\.php$"
Deny from all
LocationMatch "^/card_scan_decoder\.php$"
Deny from all
🧯 If You Can't Patch
- Implement strict network segmentation - place devices in isolated VLAN with no internet access
- Deploy web application firewall (WAF) rules to block command injection patterns
🔍 How to Verify
Check if Vulnerable:
Check if /card_scan.php or /card_scan_decoder.php endpoints accept unsanitized input parameters. Test with safe payloads like 'id=test;echo vulnerable' and observe system response.
Check Version:
Check web interface footer or system information page for firmware version. SSH/Telnet access may show version via 'cat /etc/version' or similar.
Verify Fix Applied:
Attempt exploitation with known payloads after patch. Verify PHP files properly sanitize input and no longer execute system commands.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Multiple failed login attempts followed by successful access
- Suspicious PHP file access patterns
Network Indicators:
- HTTP requests to card_scan.php with shell metacharacters
- Outbound connections from access controller to unexpected destinations
- Unusual port scanning from controller IP
SIEM Query:
source="access_controller" AND (uri="*card_scan*" AND (param="*;*" OR param="*|*" OR param="*`*"))
🔗 References
- http://packetstormsecurity.com/files/155255/Linear-eMerge-E3-1.00-06-card_scan.php-Command-Injection.html
- http://packetstormsecurity.com/files/155256/Linear-eMerge-E3-1.00-06-card_scan_decoder.php-Command-Injection.html
- http://packetstormsecurity.com/files/155272/Linear-eMerge-E3-Access-Controller-Command-Injection.html
- http://packetstormsecurity.com/files/170372/Linear-eMerge-E3-Series-Access-Controller-Command-Injection.html
- https://applied-risk.com/labs/advisories
- https://www.applied-risk.com/resources/ar-2019-005
- http://packetstormsecurity.com/files/155255/Linear-eMerge-E3-1.00-06-card_scan.php-Command-Injection.html
- http://packetstormsecurity.com/files/155256/Linear-eMerge-E3-1.00-06-card_scan_decoder.php-Command-Injection.html
- http://packetstormsecurity.com/files/155272/Linear-eMerge-E3-Access-Controller-Command-Injection.html
- http://packetstormsecurity.com/files/170372/Linear-eMerge-E3-Series-Access-Controller-Command-Injection.html
- https://applied-risk.com/labs/advisories
- https://www.applied-risk.com/resources/ar-2019-005
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-7256