CVE-2019-7268

10.0 CRITICAL

📋 TL;DR

CVE-2019-7268 allows unauthenticated attackers to upload arbitrary files to Linear eMerge 50P/5000P access control systems, leading to remote code execution. This affects organizations using these physical security devices for building access control. The vulnerability enables complete system compromise without requiring valid credentials.

💻 Affected Systems

Products:
  • Linear eMerge 50P
  • Linear eMerge 5000P
Versions: Version 4.6.07 and earlier
Operating Systems: Embedded Linux-based system
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover allowing attackers to disable physical access controls, steal sensitive data, pivot to internal networks, and potentially cause physical security breaches.

🟠

Likely Case

Remote code execution leading to data theft, system disruption, and installation of persistent backdoors on access control systems.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation, though internal threats remain.

🌐 Internet-Facing: HIGH - Devices exposed to internet are trivially exploitable without authentication.
🏢 Internal Only: HIGH - Even internally, unauthenticated exploitation allows lateral movement and system compromise.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts available; exploitation requires only network access to the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 4.6.08 and later

Vendor Advisory: https://www.applied-risk.com/resources/ar-2019-006

Restart Required: Yes

Instructions:

1. Contact Linear/Johnson Controls for updated firmware. 2. Backup configuration. 3. Apply firmware update via web interface. 4. Restart device. 5. Verify version update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate eMerge devices from internet and restrict internal network access

Firewall Rules

linux

Block all external access to eMerge web interface ports (typically 80/443)

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Immediately disconnect from internet and implement strict network segmentation
  • Deploy web application firewall with file upload filtering rules

🔍 How to Verify

Check if Vulnerable:

Check web interface for version number; versions 4.6.07 and earlier are vulnerable. Attempt file upload to /upload endpoint without authentication.

Check Version:

curl -k https://<device-ip>/version or check web interface login page

Verify Fix Applied:

Verify firmware version is 4.6.08 or later via web interface. Test that unauthenticated file upload to /upload endpoint is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated POST requests to /upload endpoint
  • Unusual file creation in web directories
  • Shell command execution from web user

Network Indicators:

  • File upload traffic to eMerge devices without authentication
  • Unexpected outbound connections from eMerge devices

SIEM Query:

source="eMerge" AND (uri="/upload" OR method="POST") AND user="-"

🔗 References

📤 Share & Export