ICS/OT

Exploited Building Access System Vulnerability Patched 5 Years After Disclosure

Vulnerabilities affecting a Nice Linear physical access product, including an exploited flaw, patched five years after their disclosure.

Door access control vulnerabilities

Vulnerabilities affecting Linear building access control products, including a security flaw that has been exploited in the wild, have been patched nearly five years after their initial disclosure.

In May 2019, at SecurityWeek’s ICS Cyber Security Conference, Gjoko Krstic, a researcher who at the time worked for industrial cybersecurity firm Applied Risk, disclosed information on more than 100 vulnerabilities found in building management and access control systems from Nortek, Prima Systems, Optergy, and Computrols.

Nortek stood out at the time because it was the only vendor that had not released patches. It claimed to have released fixes, but Krstic said at the time that the vendor had not given him the opportunity to send over the actual vulnerability details. 

Over 2,500 internet-exposed instances of the company’s Linear eMerge access control product were identified when the vulnerabilities were disclosed in 2019.

Less than one year later, in February 2020, SonicWall reported that one of the vulnerabilities found by Krstic, a critical unauthenticated remote code execution bug tracked as CVE-2019-7256, had been exploited in attacks

The security firm was seeing tens of thousands of daily attempts to exploit the vulnerability in an effort to infect devices with a piece of malware that would allow cybercriminals to launch DDoS attacks. Over 2,300 potentially affected devices had still been exposed to the internet. 

In July 2020, the US cybersecurity agency CISA published an advisory to inform customers that Nortek had released patches for five of the Linear eMerge vulnerabilities found by Krstic, but the list did not include the exploited CVE-2019-7256.

Nortek Security & Control was acquired by smart home, security and building automation solutions firm Nice in 2021, but it apparently took until 2023 for the vulnerabilities to emerge on Nice’s radar. 

Advertisement. Scroll to continue reading.

In May 2023, the vendor published a security bulletin saying that it had become aware that some of the Linear telephone entry (intercom) products had been compromised. However, no CVE identifiers were mentioned in the bulletin. 

The company urged customers to increase network security and remove the impacted system from the internet until a permanent solution is provided. Customers whose devices had been hacked were offered a firmware recovery kit at no cost.

In late June 2023, Nice published a second security bulletin, informing customers of Linear eMerge E3 series door access control products about the availability of a firmware update that should address some unspecified vulnerabilities.

CISA published a new advisory describing a dozen Linear eMerge E3 series vulnerabilities on March 5, 2024, warning that they can allow a remote attacker to gain full system access. All of the security holes have 2019 CVEs and the list includes CVE-2019-7256, the vulnerability exploited in the wild. 

CISA said the latest firmware update should address the flaws, but it’s unclear exactly when the patches were released. Krstic told SecurityWeek on Monday that Nice informed CISA in September 2023 that it had still been working on guidance for securing impacted devices. The researcher said he never received confirmation of a patch being developed or tested.

Contacted by SecurityWeek, Nice said it takes the security of its products very seriously and confirmed releasing firmware patches. 

“After we were notified of the vulnerabilities referenced in the CISA advisory, we immediately initiated an investigation to assess the validity and potential implications for our products and customers,” said Paul Williams, managing director of Nice’s home management business unit.   

“Following our investigation, we learned that these vulnerabilities are limited to telephone entry systems that were deployed outside the protection of a firewall. Furthermore, we have received no reports of sensitive data having been accessed as a result of these issues. 

“To mitigate these vulnerabilities, we immediately alerted our vendors and customers and initiated a remediation plan, including only installing our telephone entry system behind a firewall. We have since released firmware updates specifically designed to fix the vulnerabilities,” Williams added.

Related: Unpatched Sceiner Smart Lock Vulnerabilities Allow Hackers to Open Doors

Related: Axis Door Controller Vulnerability Exposes Facilities to Physical, Cyber Threats

Related: Nexx Ignores Vulnerabilities Allowing Hackers to Remotely Open Garage Doors

Related Content

Vulnerabilities

A Chrome 124 update patches the second Chrome zero-day that has been found to be exploited in malicious attacks in 2024.

Vulnerabilities

CISA’s Vulnrichment project is adding important information to CVE records to help improve vulnerability management processes.

Vulnerabilities

F5 has patched two potentially serious vulnerabilities in BIG-IP Next that could allow an attacker to take full control of a device.

Vulnerabilities

CISA and the FBI warn of threat actors abusing path traversal software vulnerabilities in attacks targeting critical infrastructure.

Mobile & Wireless

Microsoft has uncovered a new type of attack called Dirty Stream that impacted Android apps with billions of installations. 

Vulnerabilities

CISA says a critical GitLab password reset flaw is being exploited in attacks and roughly 1,400 servers have not been patched.

Vulnerabilities

A vulnerability (CVE-2024-27322) in the R programming language implementation can be exploited to execute arbitrary and be used as part of a supply chain...

Incident Response

Palo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version