Nortek Linear eMerge E3 File Upload privilege escalation [CVE-2019-7257] – Digitalmunition

Exploit/Advisories Cybersecurity study of the dark web exposes vulnerability to machine identities -- ScienceDaily

Published on July 3rd, 2019 📆 | 3945 Views ⚑


Nortek Linear eMerge E3 File Upload privilege escalation [CVE-2019-7257]

CVSS Meta Temp ScoreCurrent Exploit Price (≈)

A vulnerability classified as critical has been found in Nortek Linear eMerge E3 (the affected version unknown). This affects some unknown functionality of the component File Upload. The manipulation with an unknown input leads to a privilege escalation vulnerability. CWE is classifying the issue as CWE-269. This is going to have an impact on confidentiality, integrity, and availability.

The weakness was presented 07/02/2019. This vulnerability is uniquely identified as CVE-2019-7257 since 01/31/2019. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $0-$5k at the moment (estimation calculated on 07/03/2019).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

See 137227, 137226, 137225 and 137224 for similar entries.



VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.5
VulDB Vector: 🔒
VulDB Reliability: 🔍

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Class: Privilege escalation (CWE-269)
Local: Yes
Remote: No

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligenceinfoedit

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍Recommended: no mitigation known

0-Day Time: 🔒

01/31/2019 CVE assigned
07/02/2019 +152 days Advisory disclosed
07/03/2019 +1 days VulDB entry created
07/03/2019 +0 days VulDB last update
CVE: CVE-2019-7257 (🔒)
See also: 🔒Created: 07/03/2019 01:09 PM
Complete: 🔍

See the underground prices here!

Tagged with:

Leave a Reply ✍