CVE-2022-46381: n/a in n/a
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
AI Analysis
Technical Summary
CVE-2022-46381 is a cross-site scripting (XSS) vulnerability affecting certain versions of Linear eMerge E3-Series devices, specifically firmware versions 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e. The vulnerability arises from improper sanitization of the 'type' parameter in the web interface component badging/badge_template_v0.php. An attacker can inject malicious scripts via this parameter, which are then executed in the context of the victim's browser when accessing the affected interface. The CVSS v3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating that the vulnerability is remotely exploitable over the network without privileges but requires user interaction (such as clicking a crafted link). The impact affects confidentiality and integrity with a scope change, but does not affect availability. No known exploits are currently reported in the wild, and no official patches or vendor advisories are linked. The vulnerability is classified under CWE-79, which corresponds to improper neutralization of input leading to XSS. This vulnerability is significant because Linear eMerge E3-Series devices are access control systems commonly used in physical security environments, and exploitation could allow attackers to execute scripts in the context of legitimate users, potentially leading to session hijacking, credential theft, or manipulation of the device's web interface. The scope change in the CVSS vector suggests that exploitation could affect components beyond the initially vulnerable module, possibly impacting other parts of the device's management interface or connected systems.
Potential Impact
For European organizations, especially those in critical infrastructure, government, healthcare, and large enterprises that deploy Linear eMerge E3-Series access control systems, this vulnerability poses a risk to the confidentiality and integrity of access control management. Successful exploitation could allow attackers to steal session tokens or credentials, manipulate badge templates, or alter access control configurations indirectly by executing malicious scripts in the context of authorized users. This could lead to unauthorized physical access, data breaches, or disruption of security operations. Since the vulnerability requires user interaction, phishing or social engineering campaigns targeting administrators or security personnel are plausible attack vectors. The scope change indicates potential for broader impact within the device's management environment, increasing the risk of lateral movement or further compromise. Although availability is not directly impacted, the indirect consequences of compromised access control systems could be severe, including physical security breaches and compliance violations under European data protection regulations such as GDPR.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting access to the device's web interface to trusted networks and users only, using network segmentation and firewall rules to limit exposure. 2. Implement strong user awareness training to reduce the risk of successful phishing or social engineering attacks that could trigger the required user interaction for exploitation. 3. Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) capable of detecting and blocking XSS payloads targeting the affected parameter. 4. Monitor device logs and network traffic for unusual activity or access patterns indicative of attempted exploitation. 5. Since no official patches are currently available, organizations should contact the device vendor or authorized support channels to request firmware updates or security advisories. 6. Consider deploying compensating controls such as multi-factor authentication (MFA) for device management interfaces to reduce the impact of credential theft. 7. Regularly audit and review badge templates and access control configurations for unauthorized changes. 8. If possible, isolate the management interface from general user networks and enforce HTTPS with strict content security policies to mitigate script injection risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2022-46381: n/a in n/a
Description
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
AI-Powered Analysis
Technical Analysis
CVE-2022-46381 is a cross-site scripting (XSS) vulnerability affecting certain versions of Linear eMerge E3-Series devices, specifically firmware versions 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e. The vulnerability arises from improper sanitization of the 'type' parameter in the web interface component badging/badge_template_v0.php. An attacker can inject malicious scripts via this parameter, which are then executed in the context of the victim's browser when accessing the affected interface. The CVSS v3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating that the vulnerability is remotely exploitable over the network without privileges but requires user interaction (such as clicking a crafted link). The impact affects confidentiality and integrity with a scope change, but does not affect availability. No known exploits are currently reported in the wild, and no official patches or vendor advisories are linked. The vulnerability is classified under CWE-79, which corresponds to improper neutralization of input leading to XSS. This vulnerability is significant because Linear eMerge E3-Series devices are access control systems commonly used in physical security environments, and exploitation could allow attackers to execute scripts in the context of legitimate users, potentially leading to session hijacking, credential theft, or manipulation of the device's web interface. The scope change in the CVSS vector suggests that exploitation could affect components beyond the initially vulnerable module, possibly impacting other parts of the device's management interface or connected systems.
Potential Impact
For European organizations, especially those in critical infrastructure, government, healthcare, and large enterprises that deploy Linear eMerge E3-Series access control systems, this vulnerability poses a risk to the confidentiality and integrity of access control management. Successful exploitation could allow attackers to steal session tokens or credentials, manipulate badge templates, or alter access control configurations indirectly by executing malicious scripts in the context of authorized users. This could lead to unauthorized physical access, data breaches, or disruption of security operations. Since the vulnerability requires user interaction, phishing or social engineering campaigns targeting administrators or security personnel are plausible attack vectors. The scope change indicates potential for broader impact within the device's management environment, increasing the risk of lateral movement or further compromise. Although availability is not directly impacted, the indirect consequences of compromised access control systems could be severe, including physical security breaches and compliance violations under European data protection regulations such as GDPR.
Mitigation Recommendations
1. Immediate mitigation should focus on restricting access to the device's web interface to trusted networks and users only, using network segmentation and firewall rules to limit exposure. 2. Implement strong user awareness training to reduce the risk of successful phishing or social engineering attacks that could trigger the required user interaction for exploitation. 3. Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) capable of detecting and blocking XSS payloads targeting the affected parameter. 4. Monitor device logs and network traffic for unusual activity or access patterns indicative of attempted exploitation. 5. Since no official patches are currently available, organizations should contact the device vendor or authorized support channels to request firmware updates or security advisories. 6. Consider deploying compensating controls such as multi-factor authentication (MFA) for device management interfaces to reduce the impact of credential theft. 7. Regularly audit and review badge templates and access control configurations for unauthorized changes. 8. If possible, isolate the management interface from general user networks and enforce HTTPS with strict content security policies to mitigate script injection risks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-12-03T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d984ac4522896dcbf73cc
Added to database: 5/21/2025, 9:09:30 AM
Last enriched: 6/21/2025, 6:21:26 PM
Last updated: 8/12/2025, 2:00:26 PM
Views: 9
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.