Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
The Linear eMerge e3-Series through version 1.00-07 is vulnerable to an OS command injection vulnerability. A remote and unauthenticated attacker can execute arbitrary OS commands via the login_id parameter when invoking the forgot_password functionality over HTTP.
This vulnerability allows a remote and unauthenticated attacker to execute arbitrary OS commands on the affected system. This can lead to complete system compromise, including unauthorized access to sensitive data, modification of system configurations, and potential disruption of services. The attack vector is through the network, requires no user interaction, and has a low attack complexity, making it relatively easy for attackers to exploit.
One proof-of-concept exploit is available on github.com. Its exploitation has been reported by various sources, including vulncheck.com.
As of the current information, there is no mention of an available patch. The vulnerability affects Linear eMerge e3-Series through version 1.00-07, suggesting that newer versions, if available, may have addressed this issue. However, this needs to be confirmed with the vendor.
1. Upgrade the Linear eMerge e3-Series to a version newer than 1.00-07 if available. 2. Implement network segmentation to restrict access to the affected systems. 3. Use a web application firewall (WAF) to filter malicious requests targeting the forgot_password functionality. 4. Monitor and log all activities related to the forgot_password functionality for suspicious behavior. 5. Disable or restrict access to the forgot_password functionality if not required. 6. Apply input validation and sanitization on the login_id parameter to prevent command injection.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
NVD published the first details for CVE-2024-9441
A CVSS base score of 9.8 has been assigned.
Feedly found the first article mentioning CVE-2024-9441. See article
Feedly estimated the CVSS score as HIGH
CVE-2024-9441 is a critical OS command injection vulnerability in the Linear eMerge e3-Series through version 1.00-07, with a CVSS score of 9.8, allowing remote and unauthenticated attackers to execute arbitrary OS commands via the login_id parameter in the forgot_password functionality. Currently, there is no evidence of exploitation in the wild or public proof-of-concept exploits, and no patches are available; however, several mitigations are recommended, including upgrading to a newer version, implementing network segmentation, and applying input validation. The vulnerability poses a significant risk of complete system compromise, potentially affecting sensitive data and service availability. See article
EPSS Score was set to: 0.04% (Percentile: 10.3%)
Attacks in the wild have been reported by VulnCheck Blog. See article
Detection for the vulnerability has been added to Qualys (731835)