Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Critical Unpatched Vulnerability Exposed in Linear eMerge E3 Access Control Systems: A Threat to Enterprise Security



A newly discovered vulnerability in Linear eMerge E3 access controller systems poses significant security risks for organizations relying on these systems. Experts urge users to take immediate action to address this critical unpatched vulnerability and protect their infrastructure from potential exploitation by malicious actors.

  • MICROSOFT has issued a security update addressing 118 vulnerabilities, with two actively exploited in the wild.
  • Firefox users are advised to update their browsers immediately due to an active zero-day vulnerability.
  • A critical unpatched vulnerability was discovered in Nice Linear eMerge E3 access controller systems, posing significant security risks.
  • The affected versions of Nortek Linear eMerge E3 Access Control include several outdated versions with known vulnerabilities.
  • Organizations using Linear eMerge E3 access control systems are strongly recommended to take immediate action to prevent potential exploitation by malicious actors.
  • Nice recommends customers follow security best practices, such as network segmentation and restricting internet access.



  • Microsoft has recently issued a security update that addresses 118 vulnerabilities, with two of them being actively exploited in the wild. This move highlights the importance of timely patching and security updates for organizations relying on various software systems.

    Furthermore, Firefox users are advised to update their browsers immediately due to an active zero-day vulnerability. This discovery underscores the need for continuous monitoring of software applications and prompt action when vulnerabilities are identified.

    In a more alarming development, researchers have discovered a critical unpatched vulnerability in Nice Linear eMerge E3 access controller systems. This flaw could enable remote attackers to execute arbitrary operating system commands, posing significant security risks for organizations that use these systems.

    The affected versions of the Nortek Linear eMerge E3 Access Control include 0.32-03i, 0.32-04m, 0.32-05p, 0.32-05z, 0.32-07p, 0.32-07e, 0.32-08e, 0.32-08f, 0.32-09c, 1.00.05, and 1.00.07. Vulnerability researchers have released proof-of-concept exploits for this flaw following public disclosure, which raises concerns about potential exploitation by threat actors.

    It is worth noting that a similar critical vulnerability impacting the E3 system, CVE-2019-7256 (CVSS score: 10.0), was originally disclosed in May 2019 but wasn't addressed until earlier this year. Due to the vendor's slow response to the previous issue, experts are skeptical about the possibility of an imminent fix for CVE-2024-9441.

    Given the severity of this newly discovered vulnerability and considering the vendor's past performance regarding addressing similar issues, it is strongly recommended that organizations using Linear eMerge E3 access control systems take immediate action. This could involve isolating these devices or taking them offline to prevent potential exploitation by malicious actors.

    In a statement, Nice recommends customers to adhere to security best practices such as enforcing network segmentation, restricting access from the internet, and placing the product behind a network firewall.

    The recent discoveries of unpatched vulnerabilities in various software systems underscore the importance of constant vigilance and swift action in addressing these issues. Organizations must prioritize timely patching and implement robust security measures to protect their critical infrastructure from threats like those outlined in the context provided.

    Cybersecurity is an ongoing challenge that demands continuous attention and proactive steps from organizations to prevent breaches and minimize the impact of such incidents.



    Related Information:

  • https://thehackernews.com/2024/10/experts-warn-of-critical-unpatched.html

  • https://nvd.nist.gov/vuln/detail/CVE-2019-7256

  • https://www.cvedetails.com/cve/CVE-2019-7256/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-9441

  • https://www.cvedetails.com/cve/CVE-2024-9441/


  • Published: Thu Oct 10 08:05:33 2024 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us