www.cisa.gov Open in urlscan Pro
104.102.57.87  Public Scan

Submitted URL: http://cisa.gov/news-events/ics-advisories/icsa-24-065-01
Effective URL: https://www.cisa.gov/news-events/ics-advisories/icsa-24-065-01
Submission: On March 05 via api from IL — Scanned from IL

Form analysis 2 forms found in the DOM

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id1">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id50" class="gstl_50 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti50" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id1" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st50" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb50" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

<form class="gsc-search-box gsc-search-box-tools" accept-charset="utf-8">
  <table cellspacing="0" cellpadding="0" role="presentation" class="gsc-search-box">
    <tbody>
      <tr>
        <td class="gsc-input">
          <div class="gsc-input-box" id="gsc-iw-id2">
            <table cellspacing="0" cellpadding="0" role="presentation" id="gs_id51" class="gstl_51 gsc-input" style="width: 100%; padding: 0px;">
              <tbody>
                <tr>
                  <td id="gs_tti51" class="gsib_a"><input autocomplete="off" type="text" size="10" class="gsc-input" name="search" title="search" aria-label="search" id="gsc-i-id2" dir="ltr" spellcheck="false"
                      style="width: 100%; padding: 0px; border: none; margin: 0px; height: auto; outline: none;"></td>
                  <td class="gsib_b">
                    <div class="gsst_b" id="gs_st51" dir="ltr"><a class="gsst_a" href="javascript:void(0)" title="Clear search box" role="button" style="display: none;"><span class="gscb_a" id="gs_cb51" aria-hidden="true">×</span></a></div>
                  </td>
                </tr>
              </tbody>
            </table>
          </div>
        </td>
        <td class="gsc-search-button"><button class="gsc-search-button gsc-search-button-v2"><svg width="13" height="13" viewBox="0 0 13 13">
              <title>search</title>
              <path
                d="m4.8495 7.8226c0.82666 0 1.5262-0.29146 2.0985-0.87438 0.57232-0.58292 0.86378-1.2877 0.87438-2.1144 0.010599-0.82666-0.28086-1.5262-0.87438-2.0985-0.59352-0.57232-1.293-0.86378-2.0985-0.87438-0.8055-0.010599-1.5103 0.28086-2.1144 0.87438-0.60414 0.59352-0.8956 1.293-0.87438 2.0985 0.021197 0.8055 0.31266 1.5103 0.87438 2.1144 0.56172 0.60414 1.2665 0.8956 2.1144 0.87438zm4.4695 0.2115 3.681 3.6819-1.259 1.284-3.6817-3.7 0.0019784-0.69479-0.090043-0.098846c-0.87973 0.76087-1.92 1.1413-3.1207 1.1413-1.3553 0-2.5025-0.46363-3.4417-1.3909s-1.4088-2.0686-1.4088-3.4239c0-1.3553 0.4696-2.4966 1.4088-3.4239 0.9392-0.92727 2.0864-1.3969 3.4417-1.4088 1.3553-0.011889 2.4906 0.45771 3.406 1.4088 0.9154 0.95107 1.379 2.0924 1.3909 3.4239 0 1.2126-0.38043 2.2588-1.1413 3.1385l0.098834 0.090049z">
              </path>
            </svg></button></td>
        <td class="gsc-clear-button">
          <div class="gsc-clear-button" title="clear results">&nbsp;</div>
        </td>
      </tr>
    </tbody>
  </table>
</form>

Text Content

Skip to main content

An official website of the United States government

Here’s how you know

Here’s how you know

Official websites use .gov
A .gov website belongs to an official government organization in the United
States.

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the
.gov website. Share sensitive information only on official, secure websites.


Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

×

search
 

Menu
Close
×

search
 

 * Topics
   Topics
   Cybersecurity Best Practices
   Cyber Threats and Advisories
   Critical Infrastructure Security and Resilience
   Election Security
   Emergency Communications
   Industrial Control Systems
   Information and Communications Technology Supply Chain Security
   Partnerships and Collaboration
   Physical Security
   Risk Management
   How can we help?
   GovernmentEducational InstitutionsIndustryState, Local, Tribal, and
   TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help
   LocallyFaith-Based CommunityExecutives
 * Spotlight
 * Resources & Tools
   Resources & Tools
   All Resources & Tools
   Services
   Programs
   Resources
   Training
   Groups
 * News & Events
   News & Events
   News
   Events
   Cybersecurity Alerts & Advisories
   Directives
   Request a CISA Speaker
   Congressional Testimony
   CISA Conferences
   CISA Live!
 * Careers
   Careers
   Benefits & Perks
   HireVue Applicant Reasonable Accommodations Process
   Hiring
   Resume & Application Tips
   Students & Recent Graduates
   Veteran and Military Spouses
   Work @ CISA
 * About
   About
   Culture
   Divisions & Offices
   Regions
   Leadership
   Doing Business with CISA
   Site Links
   Reporting Employee and Contractor Misconduct
   CISA GitHub
   2023 Year In Review
   Contact Us

Report a Cyber Issue
America's Cyber Defense Agency
Breadcrumb
 1. Home
 2. News & Events
 3. Cybersecurity Advisories
 4. ICS Advisory

Share:


ICS Advisory


NICE LINEAR EMERGE E3-SERIES

Release Date
March 05, 2024
Alert Code
ICSA-24-065-01


View CSAF(link is external)


1. EXECUTIVE SUMMARY

 * CVSS v3 10.0
 * ATTENTION: Exploitable remotely/low attack complexity/public exploits are
   available
 * Vendor: Nice
 * Equipment: Linear eMerge E3-Series
 * Vulnerabilities: Path traversal, Cross-site scripting, OS command injection,
   Unrestricted Upload of File with Dangerous Type, Incorrect Authorization,
   Exposure of Sensitive Information to an Authorized Actor, Insufficiently
   Protected Credentials, Use of Hard-coded Credentials, Cross-site Request
   Forgery, Out-of-bounds Write


2. RISK EVALUATION

Successful exploitation of these vulnerabilities could allow a remote attacker
to gain full system access.


3. TECHNICAL DETAILS


3.1 AFFECTED PRODUCTS

The following versions of Nice Linear eMerge E3-Series are affected:

 * Linear eMerge E3-Series: versions 1.00-06 and prior


3.2 VULNERABILITY OVERVIEW

3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (‘PATH
TRAVERSAL') CWE-22(LINK IS EXTERNAL)

Nice Linear eMerge E3-Series versions 1.00-06 and prior are vulnerable to path
traversal. This could allow an attacker to gain unauthorized access to the
system and sensitive data.

CVE-2019-7253 has been assigned to this vulnerability. A CVSS v3 base score of
9.8 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H(link is external)).

3.2.2 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY (‘PATH
TRAVERSAL') CWE-22(LINK IS EXTERNAL)

Versions of Nice Linear eMerge E3-Series firmware 1.00-06 and prior are
vulnerable to a file inclusion through path traversal, which could give the
attacker access to sensitive information.

CVE-2019-7254 has been assigned to this vulnerability. A CVSS v3 base score of
7.5 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N(link is external)).

3.2.3 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION (‘CROSS-SITE
SCRIPTING') CWE-79(LINK IS EXTERNAL)

Nice Linear eMerge E3-Series versions 1.00-06 and prior are vulnerable to
cross-site scripting, which could allow an attacker to obtain and alter some
information on the system.

CVE-2019-7255 has been assigned to this vulnerability. A CVSS v3 base score of
6.1 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N(link is external)).

3.2.4 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND (‘OS
COMMAND INJECTION') CWE-78(LINK IS EXTERNAL)

Nice Linear eMerge E3-Series versions 1.00-06 and prior are vulnerable to OS
command injection, which could allow an attacker to cause remote code execution.

CVE-2019-7256 has been assigned to this vulnerability. A CVSS v3 base score of
10.0 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H(link is external)).

3.2.5 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434(LINK IS EXTERNAL)

Nice Linear eMerge E3-Series versions 1.00-06 and prior are vulnerable to
unrestricted upload of malicious files, which could allow an attacker to execute
arbitrary code.

CVE-2019-7257 has been assigned to this vulnerability. A CVSS v3 base score of
10.0 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H(link is external)).

3.2.6 INCORRECT AUTHORIZATION CWE-863(LINK IS EXTERNAL)

Nice Linear eMerge E3-Series versions 1.00-06 and prior suffer from an
authorization mechanism vulnerability. This could allow an attacker to escalate
privileges and gain full control of the system.

CVE-2019-7258 has been assigned to this vulnerability. A CVSS v3 base score of
8.8 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H(link is external)).

3.2.7 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200(LINK IS
EXTERNAL)

An authorization bypass occurs in Nice Linear eMerge E3-Series versions 1.00-06
and prior when an authenticated attacker visits a specific GET request against
the target, resulting in disclosure of administrative credentials in clear-text.
This allows the attacker to re-login with admin privileges and have full access
to the control interface.

CVE-2019-7259 has been assigned to this vulnerability. A CVSS v3 base score of
8.8 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H(link is external)).

3.2.8 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522(LINK IS EXTERNAL)

The application of Nice Linear eMerge E3-Series versions 1.00-06 and prior
stores passwords in clear-text in its DBMS system. Storing a password in
plaintext may result in a system compromise.

CVE-2019-7260 has been assigned to this vulnerability. A CVSS v3 base score of
9.8 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H(link is external)).

3.2.9 USE OF HARD-CODED CREDENTIALS CWE-798(LINK IS EXTERNAL)

Hard-coded credentials are present in multiple binaries bundled in the Nice
Linear eMerge E3-Series versions 1.00-06 and prior firmware OS. These hard-coded
credentials typically create a significant hole that could allow an attacker to
bypass the authentication configured by the software administrator.

CVE-2019-7261 has been assigned to this vulnerability. A CVSS v3 base score of
9.8 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H(link is external)).

3.2.10 USE OF HARD-CODED CREDENTIALS CWE-798(LINK IS EXTERNAL)

The Nice Linear eMerge E3-Series versions 1.00-06 and prior access control
platform has SSH enabled with hardcoded credentials for the root account. This
could allow an unauthenticated attacker to initiate a secure connection with
highest privileges (root) and gain full system access.

CVE-2019-7265 has been assigned to this vulnerability. A CVSS v3 base score of
9.8 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H(link is external)).

3.2.11 CROSS-SITE REQUEST FORGERY (CSRF) CWE-352(LINK IS EXTERNAL)

The application of Nice Linear eMerge E3-Series versions 1.00-06 and prior
allows users to perform certain actions via HTTP requests without performing any
validity checks to verify the requests. An attacker could exploit this to
perform certain actions with administrative privileges if a logged-in user
visits a malicious web site.

CVE-2019-7262 has been assigned to this vulnerability. A CVSS v3 base score of
8.8 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H(link is external)).

3.2.12 OUT-OF-BOUNDS WRITE CWE-787(LINK IS EXTERNAL)

A stack-based buffer overflow exists, affecting several CGI binaries of Nice
Linear eMerge E3-Series versions 1.00-06 and prior. The vulnerability is caused
due to a boundary error in the processing of a user input, which an attacker
could exploit to cause a buffer overflow. Successful exploitation could allow
execution of arbitrary code on the affected device.

CVE-2019-7264 has been assigned to this vulnerability. A CVSS v3 base score of
9.8 has been calculated; the CVSS vector string is
(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H(link is external)).


3.3 BACKGROUND

 * CRITICAL INFRASTRUCTURE SECTORS: Commercial Facilities
 * COUNTRIES/AREAS DEPLOYED: Worldwide
 * COMPANY HEADQUARTERS LOCATION: Italy


3.4 RESEARCHER

Gjoko Krstic from Zero Science Lab reported these vulnerabilities to CISA.


4. MITIGATIONS

Nice/Nortek encourages users to upgrade to the latest firmware to mitigate the
risk of these vulnerabilities. Please see Nice's E3-Bulletin(link is
external) for more information.

Nice also recommends the following defensive measures to minimize the risk of
exploitation of these vulnerabilities:

 * Minimize network exposure of devices, ensuring they are not accessible from
   the internet.
 * Place the devices behind firewalls and isolate them from other networks.
 * When remote access is required, use secure methods, such as Virtual Private
   Networks (VPNs). Keep your VPNs as updated as possible.
 * Change default credentials on the device.
 * Change the default IP address of the device.

See Nice's Telephone Entry Bulletin(link is external) for additional
information.

Users should contact Nice(link is external) with any questions.

CISA reminds organizations to perform proper impact analysis and risk assessment
prior to deploying defensive measures.

CISA also provides a section for control systems security recommended
practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing
cyber defense best practices are available for reading and download,
including Improving Industrial Control Systems Cybersecurity with
Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies
for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available
on the ICS webpage at cisa.gov/ics in the technical information
paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation
Strategies.

Organizations observing suspected malicious activity should follow established
internal procedures and report findings to CISA for tracking and correlation
against other incidents.


5. UPDATE HISTORY

 * March 5, 2024: Initial Publication

This product is provided subject to this Notification and this Privacy &
Use policy.


PLEASE SHARE YOUR THOUGHTS

We recently updated our anonymous product survey; we’d welcome your feedback.


RELATED ADVISORIES

Feb 29, 2024
ICS Advisory | ICSA-24-060-01


DELTA ELECTRONICS CNCSOFT-B

Feb 27, 2024
ICS Advisory | ICSA-24-058-01


MITSUBISHI ELECTRIC MULTIPLE FACTORY AUTOMATION PRODUCTS

Feb 22, 2024
ICS Advisory | ICSA-24-053-01


DELTA ELECTRONICS CNCSOFT-B DOPSOFT

Feb 20, 2024
ICS Advisory | ICSA-24-051-01


COMMEND WS203VICM

Return to top
 * Topics
 * Spotlight
 * Resources & Tools
 * News & Events
 * Careers
 * About

Cybersecurity & Infrastructure Security Agency
 * Facebook
 * Twitter
 * LinkedIn
 * YouTube
 * Instagram
 * RSS

CISA Central 888-282-0870 central@cisa.dhs.gov(link sends email)
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
 * About CISA
 * Accessibility
 * Budget and Performance
 * DHS.gov
 * FOIA Requests
 * No FEAR Act
 * Office of Inspector General
 * Privacy Policy
 * Subscribe
 * The White House
 * USA.gov
 * Website Feedback