CVE-2025-35981: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Gallagher Command Centre Server
Exposure of Private Personal Information to an Unauthorized Actor (CWE-359) in the Command Centre Server allows a privileged Operator to view limited personal data about a Cardholder they would not normally have permissions to view. This issue affects Command Centre Server: 9.30.1874 (MR1), 9.20.2337 (MR3), 9.10.3194 (MR6).
AI Analysis
Technical Summary
CVE-2025-35981 is a vulnerability identified in Gallagher Command Centre Server, a widely used physical access control management system. The flaw is categorized under CWE-359, which pertains to the exposure of private personal information to unauthorized actors. Specifically, this vulnerability allows a privileged operator—someone with elevated but not full administrative rights—to view limited personal data about cardholders that they would not normally be authorized to access. The affected versions include 9.30.1874 (MR1), 9.20.2337 (MR3), and 9.10.3194 (MR6). The vulnerability arises due to insufficient access control enforcement within the Command Centre Server, permitting privilege escalation in terms of data visibility. Exploitation does not require user interaction but does require the attacker to have privileged operator credentials, which limits the attack surface to insider threats or compromised operator accounts. The CVSS v3.1 base score is 5.5 (medium), reflecting the moderate impact on confidentiality without affecting integrity or availability. No public exploits have been reported yet, and no patches are currently linked, indicating that remediation may require vendor intervention. This vulnerability is significant because it exposes sensitive personal information managed by physical access control systems, potentially violating privacy regulations such as GDPR and increasing insider threat risks.
Potential Impact
For European organizations, the exposure of private personal information through this vulnerability can lead to significant privacy compliance issues under GDPR, which mandates strict controls over personal data access and processing. Unauthorized viewing of cardholder data by privileged operators could result in data breaches, loss of trust, and regulatory penalties. Organizations relying on Gallagher Command Centre for managing physical access to sensitive facilities—such as government buildings, critical infrastructure, healthcare, and financial institutions—may face increased insider threat risks. The confidentiality breach could also facilitate social engineering or targeted attacks if personal data is leveraged maliciously. While the vulnerability does not impact system integrity or availability, the reputational damage and potential legal consequences from privacy violations can be substantial. Additionally, the need to audit and monitor privileged user activity will increase operational overhead. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially from malicious insiders or compromised operator accounts.
Mitigation Recommendations
Organizations should immediately review and tighten access controls for privileged operators within Gallagher Command Centre Server, ensuring the principle of least privilege is strictly enforced. Implement role-based access controls (RBAC) that limit data visibility to only what is necessary for each operator’s role. Enable detailed logging and continuous monitoring of operator activities to detect any unauthorized access to personal data. Conduct regular audits of access logs and investigate anomalies promptly. Segregate duties where possible to reduce the risk of a single operator accessing sensitive data beyond their scope. Engage with Gallagher to obtain and apply security patches or updates addressing this vulnerability as soon as they become available. Additionally, consider implementing multi-factor authentication (MFA) for operator accounts to reduce the risk of credential compromise. Train staff on the importance of data privacy and insider threat awareness. Finally, review and update incident response plans to include scenarios involving insider data exposure.
Affected Countries
United Kingdom, Germany, Netherlands, France, Sweden, Norway, Switzerland
CVE-2025-35981: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Gallagher Command Centre Server
Description
Exposure of Private Personal Information to an Unauthorized Actor (CWE-359) in the Command Centre Server allows a privileged Operator to view limited personal data about a Cardholder they would not normally have permissions to view. This issue affects Command Centre Server: 9.30.1874 (MR1), 9.20.2337 (MR3), 9.10.3194 (MR6).
AI-Powered Analysis
Technical Analysis
CVE-2025-35981 is a vulnerability identified in Gallagher Command Centre Server, a widely used physical access control management system. The flaw is categorized under CWE-359, which pertains to the exposure of private personal information to unauthorized actors. Specifically, this vulnerability allows a privileged operator—someone with elevated but not full administrative rights—to view limited personal data about cardholders that they would not normally be authorized to access. The affected versions include 9.30.1874 (MR1), 9.20.2337 (MR3), and 9.10.3194 (MR6). The vulnerability arises due to insufficient access control enforcement within the Command Centre Server, permitting privilege escalation in terms of data visibility. Exploitation does not require user interaction but does require the attacker to have privileged operator credentials, which limits the attack surface to insider threats or compromised operator accounts. The CVSS v3.1 base score is 5.5 (medium), reflecting the moderate impact on confidentiality without affecting integrity or availability. No public exploits have been reported yet, and no patches are currently linked, indicating that remediation may require vendor intervention. This vulnerability is significant because it exposes sensitive personal information managed by physical access control systems, potentially violating privacy regulations such as GDPR and increasing insider threat risks.
Potential Impact
For European organizations, the exposure of private personal information through this vulnerability can lead to significant privacy compliance issues under GDPR, which mandates strict controls over personal data access and processing. Unauthorized viewing of cardholder data by privileged operators could result in data breaches, loss of trust, and regulatory penalties. Organizations relying on Gallagher Command Centre for managing physical access to sensitive facilities—such as government buildings, critical infrastructure, healthcare, and financial institutions—may face increased insider threat risks. The confidentiality breach could also facilitate social engineering or targeted attacks if personal data is leveraged maliciously. While the vulnerability does not impact system integrity or availability, the reputational damage and potential legal consequences from privacy violations can be substantial. Additionally, the need to audit and monitor privileged user activity will increase operational overhead. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially from malicious insiders or compromised operator accounts.
Mitigation Recommendations
Organizations should immediately review and tighten access controls for privileged operators within Gallagher Command Centre Server, ensuring the principle of least privilege is strictly enforced. Implement role-based access controls (RBAC) that limit data visibility to only what is necessary for each operator’s role. Enable detailed logging and continuous monitoring of operator activities to detect any unauthorized access to personal data. Conduct regular audits of access logs and investigate anomalies promptly. Segregate duties where possible to reduce the risk of a single operator accessing sensitive data beyond their scope. Engage with Gallagher to obtain and apply security patches or updates addressing this vulnerability as soon as they become available. Additionally, consider implementing multi-factor authentication (MFA) for operator accounts to reduce the risk of credential compromise. Train staff on the importance of data privacy and insider threat awareness. Finally, review and update incident response plans to include scenarios involving insider data exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Gallagher
- Date Reserved
- 2025-06-17T02:18:59.266Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f9a9e6102015466a330ff4
Added to database: 10/23/2025, 4:07:02 AM
Last enriched: 10/30/2025, 4:41:18 AM
Last updated: 12/6/2025, 3:52:06 AM
Views: 171
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12510: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in trustindex Widgets for Google Reviews
HighCVE-2025-11263: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in linkwhspr Link Whisper Free
MediumCVE-2025-65955
LowCVE-2025-14116: Server-Side Request Forgery in xerrors Yuxi-Know
MediumCVE-2025-14111: Path Traversal in Rarlab RAR App
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.