Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-35981: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Gallagher Command Centre Server

0
Medium
VulnerabilityCVE-2025-35981cvecve-2025-35981cwe-359
Published: Thu Oct 23 2025 (10/23/2025, 03:37:36 UTC)
Source: CVE Database V5
Vendor/Project: Gallagher
Product: Command Centre Server

Description

Exposure of Private Personal Information to an Unauthorized Actor (CWE-359) in the Command Centre Server allows a privileged Operator to view limited personal data about a Cardholder they would not normally have permissions to view. This issue affects Command Centre Server: 9.30.1874 (MR1), 9.20.2337 (MR3), 9.10.3194 (MR6).

AI-Powered Analysis

AILast updated: 10/23/2025, 04:07:59 UTC

Technical Analysis

CVE-2025-35981 is a vulnerability categorized under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) affecting Gallagher's Command Centre Server software versions 9.30.1874 (MR1), 9.20.2337 (MR3), and 9.10.3194 (MR6). The flaw allows a privileged operator—someone with elevated but not necessarily administrative rights—to view personal data of cardholders that they would not normally be authorized to access. This exposure stems from insufficient access control enforcement within the Command Centre Server, which manages physical access control and security operations. The vulnerability impacts confidentiality by allowing unauthorized disclosure of sensitive personal information, but it does not affect data integrity or system availability. Exploitation requires local access with privileged operator credentials, and no user interaction is needed. The CVSS 3.1 base score is 5.5 (medium severity), reflecting the limited scope and access requirements. No public exploits have been reported, and no patches are currently linked, indicating that mitigation may rely on vendor updates or configuration changes. Gallagher Command Centre Server is widely used in physical security deployments, including in critical infrastructure and enterprise environments, making this vulnerability relevant for organizations relying on this platform for access control and security management.

Potential Impact

For European organizations, the primary impact of CVE-2025-35981 is the unauthorized disclosure of private personal information of cardholders, which could include employees, contractors, or visitors. This exposure can lead to privacy violations, regulatory non-compliance (e.g., GDPR), and reputational damage. Although the vulnerability does not allow modification or disruption of services, the leakage of sensitive data can facilitate social engineering attacks or insider threats. Organizations in sectors with stringent privacy requirements—such as finance, healthcare, government, and critical infrastructure—face heightened risks. The requirement for privileged operator access limits the attack surface but underscores the importance of strict role-based access controls and monitoring. Since Gallagher Command Centre Server is often integrated into physical security systems, unauthorized data exposure could also undermine trust in security operations and complicate incident response efforts.

Mitigation Recommendations

European organizations should immediately review and tighten access controls for privileged operator accounts within Gallagher Command Centre Server, ensuring the principle of least privilege is strictly enforced. Implement detailed logging and monitoring of operator activities to detect any unauthorized access to personal data. Conduct regular audits of user permissions and remove unnecessary privileges. Engage with Gallagher to obtain and apply security patches or updates as soon as they become available. If patches are delayed, consider temporary compensating controls such as network segmentation to limit access to the Command Centre Server and multi-factor authentication for operator accounts. Additionally, provide security awareness training to operators about the sensitivity of personal data and the importance of adhering to access policies. Finally, ensure compliance with GDPR by documenting the vulnerability, impact assessments, and mitigation steps taken.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Gallagher
Date Reserved
2025-06-17T02:18:59.266Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f9a9e6102015466a330ff4

Added to database: 10/23/2025, 4:07:02 AM

Last enriched: 10/23/2025, 4:07:59 AM

Last updated: 10/23/2025, 5:38:20 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats