CVE-2025-35981: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Gallagher Command Centre Server
Exposure of Private Personal Information to an Unauthorized Actor (CWE-359) in the Command Centre Server allows a privileged Operator to view limited personal data about a Cardholder they would not normally have permissions to view. This issue affects Command Centre Server: 9.30.1874 (MR1), 9.20.2337 (MR3), 9.10.3194 (MR6).
AI Analysis
Technical Summary
CVE-2025-35981 is a vulnerability categorized under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) affecting Gallagher's Command Centre Server software versions 9.30.1874 (MR1), 9.20.2337 (MR3), and 9.10.3194 (MR6). The flaw allows a privileged operator—someone with elevated but not necessarily administrative rights—to view personal data of cardholders that they would not normally be authorized to access. This exposure stems from insufficient access control enforcement within the Command Centre Server, which manages physical access control and security operations. The vulnerability impacts confidentiality by allowing unauthorized disclosure of sensitive personal information, but it does not affect data integrity or system availability. Exploitation requires local access with privileged operator credentials, and no user interaction is needed. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the limited scope and access requirements. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may rely on vendor updates or configuration changes. Gallagher Command Centre Server is widely used in physical security deployments, including in critical infrastructure and enterprise environments, making this vulnerability relevant for organizations relying on this platform for access control and security management.
Potential Impact
For European organizations, the primary impact of CVE-2025-35981 is the unauthorized disclosure of private personal information of cardholders, which could include employees, contractors, or visitors. This exposure can lead to privacy violations, regulatory non-compliance (e.g., GDPR), and reputational damage. Although the vulnerability does not allow modification or disruption of services, the leakage of sensitive data can facilitate social engineering attacks or insider threats. Organizations in sectors with stringent privacy requirements—such as finance, healthcare, government, and critical infrastructure—face heightened risks. The requirement for privileged operator access limits the attack surface but underscores the importance of strict role-based access controls and monitoring. Since Gallagher Command Centre Server is often integrated into physical security systems, unauthorized data exposure could also undermine trust in security operations and complicate incident response efforts.
Mitigation Recommendations
European organizations should immediately review and tighten access controls for privileged operator accounts within Gallagher Command Centre Server, ensuring the principle of least privilege is strictly enforced. Implement detailed logging and monitoring of operator activities to detect any unauthorized access to personal data. Conduct regular audits of user permissions and remove unnecessary privileges. Engage with Gallagher to obtain and apply security patches or updates as soon as they become available. If patches are delayed, consider temporary compensating controls such as network segmentation to limit access to the Command Centre Server and multi-factor authentication for operator accounts. Additionally, provide security awareness training to operators about the sensitivity of personal data and the importance of adhering to access policies. Finally, ensure compliance with GDPR by documenting the vulnerability, impact assessments, and mitigation steps taken.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden
CVE-2025-35981: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Gallagher Command Centre Server
Description
Exposure of Private Personal Information to an Unauthorized Actor (CWE-359) in the Command Centre Server allows a privileged Operator to view limited personal data about a Cardholder they would not normally have permissions to view. This issue affects Command Centre Server: 9.30.1874 (MR1), 9.20.2337 (MR3), 9.10.3194 (MR6).
AI-Powered Analysis
Technical Analysis
CVE-2025-35981 is a vulnerability categorized under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) affecting Gallagher's Command Centre Server software versions 9.30.1874 (MR1), 9.20.2337 (MR3), and 9.10.3194 (MR6). The flaw allows a privileged operator—someone with elevated but not necessarily administrative rights—to view personal data of cardholders that they would not normally be authorized to access. This exposure stems from insufficient access control enforcement within the Command Centre Server, which manages physical access control and security operations. The vulnerability impacts confidentiality by allowing unauthorized disclosure of sensitive personal information, but it does not affect data integrity or system availability. Exploitation requires local access with privileged operator credentials, and no user interaction is needed. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the limited scope and access requirements. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may rely on vendor updates or configuration changes. Gallagher Command Centre Server is widely used in physical security deployments, including in critical infrastructure and enterprise environments, making this vulnerability relevant for organizations relying on this platform for access control and security management.
Potential Impact
For European organizations, the primary impact of CVE-2025-35981 is the unauthorized disclosure of private personal information of cardholders, which could include employees, contractors, or visitors. This exposure can lead to privacy violations, regulatory non-compliance (e.g., GDPR), and reputational damage. Although the vulnerability does not allow modification or disruption of services, the leakage of sensitive data can facilitate social engineering attacks or insider threats. Organizations in sectors with stringent privacy requirements—such as finance, healthcare, government, and critical infrastructure—face heightened risks. The requirement for privileged operator access limits the attack surface but underscores the importance of strict role-based access controls and monitoring. Since Gallagher Command Centre Server is often integrated into physical security systems, unauthorized data exposure could also undermine trust in security operations and complicate incident response efforts.
Mitigation Recommendations
European organizations should immediately review and tighten access controls for privileged operator accounts within Gallagher Command Centre Server, ensuring the principle of least privilege is strictly enforced. Implement detailed logging and monitoring of operator activities to detect any unauthorized access to personal data. Conduct regular audits of user permissions and remove unnecessary privileges. Engage with Gallagher to obtain and apply security patches or updates as soon as they become available. If patches are delayed, consider temporary compensating controls such as network segmentation to limit access to the Command Centre Server and multi-factor authentication for operator accounts. Additionally, provide security awareness training to operators about the sensitivity of personal data and the importance of adhering to access policies. Finally, ensure compliance with GDPR by documenting the vulnerability, impact assessments, and mitigation steps taken.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Gallagher
- Date Reserved
- 2025-06-17T02:18:59.266Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f9a9e6102015466a330ff4
Added to database: 10/23/2025, 4:07:02 AM
Last enriched: 10/23/2025, 4:07:59 AM
Last updated: 10/23/2025, 5:38:20 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62499: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2025-61865: Unquoted search path or element in I-O DATA DEVICE, INC. NarSuS App
MediumCVE-2025-54856: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2025-54806: Cross-site scripting (XSS) in GROWI, Inc. GROWI
MediumLazarus Group Hunts European Drone Manufacturing Data
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.