Description |
Nice Linear eMerge E3-Series is an access control system that is widely used in many environments. The OS has a command injection vulnerability that allows attackers to perform remote code execution. Impacted E3 controller models include E3 Essentials, E3 Elite, E3 Enterprise (ProControl) |
||||||
CVE ID |
CVE-2019-7256 (https://nvd.nist.gov/vuln/detail/CVE-2019-7256) |
||||||
NDR Cloud Detection Rule |
FortiNDR Cloud v2024.3+
|
||||||
Playbook |
N/A | ||||||
Threat hunting |
FortiNDR Cloud users can use the following IOCs from Fortinet to hunt for “Nice Linear eMerge Command Injection Vulnerability” related activities |
||||||
Suricata Coverage |
Customers can create custom investigation/detections using the Suricata signatures below 2029213 → ET EXPLOIT Linear eMerge E3 Unauthenticated Command Injection Outbound (CVE-2019-7256) 2033757 → ET EXPLOIT eMerge E3 Command Injection Inbound (CVE-2019-7256) |
||||||
Other Fortinet Products |
For more details regarding mitigating the vulnerability by utilizing Fortinet products, please refer to |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.