CVE-2025-44003: CWE-772 Missing Release of Resource after Effective Lifetime in Gallagher T-Series Readers
Missing Release of Resource after Effective Lifetime (CWE-772) in the Gallagher T-Series Reader allows an attacker with physical access to the reader to perform a limited denial of service when 125 kHz Card Technology is enabled. This issue affects T-Series Readers: 9.20 prior to vCR9.20.250213a (distributed in 9.20.1827 (MR2)), 9.10 prior to vCR9.10.250213a (distributed in 9.10.2692(MR5)), 9.00 prior to vCR9.00.250619a (distributed in vEL9.00.3371 (MR7)), all versions of 8.90 and prior.
AI Analysis
Technical Summary
CVE-2025-44003 is a medium-severity vulnerability identified in Gallagher T-Series Readers, specifically affecting versions prior to vCR9.20.250213a, vCR9.10.250213a, and vCR9.00.250619a, as well as all versions of 8.90 and earlier. The vulnerability is classified under CWE-772, which pertains to the missing release of a resource after its effective lifetime. In this context, the resource in question is related to the 125 kHz card technology functionality within the reader. The flaw allows an attacker with physical access to the reader to trigger a limited denial of service (DoS) condition. This occurs because the reader fails to properly release resources after their intended use, leading to resource exhaustion or lock-up states that degrade the device's availability. The attack vector requires physical proximity or access, as remote exploitation is not indicated. No authentication or user interaction is necessary beyond physical access. The CVSS v3.1 score is 4.3, reflecting a low attack vector (adjacent network), low complexity, no privileges required, no user interaction, and impact limited to availability only. There are no known exploits in the wild, and no official patches have been linked yet. This vulnerability could disrupt access control systems relying on these readers, potentially causing operational interruptions in facilities using Gallagher T-Series Readers with 125 kHz card technology enabled.
Potential Impact
For European organizations, the impact of CVE-2025-44003 primarily concerns physical security and operational continuity. Gallagher T-Series Readers are commonly deployed in physical access control systems across various sectors including corporate offices, government buildings, healthcare facilities, and critical infrastructure sites. A successful exploitation could cause temporary denial of service of the reader, preventing legitimate access and potentially causing workflow disruptions or security lapses. While the vulnerability does not compromise confidentiality or integrity, the availability impact could delay entry or exit, affecting security personnel response times and operational efficiency. Facilities with high reliance on 125 kHz card technology are more vulnerable, especially where physical access to readers is less controlled. In environments with strict regulatory compliance requirements (e.g., GDPR, NIS Directive), any disruption to security controls could have compliance implications. However, since exploitation requires physical access, the threat is somewhat mitigated by existing physical security measures.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately assess the versions of Gallagher T-Series Readers deployed and identify those running affected firmware versions. 2) Implement strict physical security controls around reader hardware to prevent unauthorized physical access, including surveillance, tamper detection, and secure mounting. 3) Disable or phase out the use of 125 kHz card technology where possible, migrating to more secure authentication methods such as higher frequency RFID or smart cards. 4) Monitor reader behavior for signs of resource exhaustion or denial of service conditions and establish incident response procedures for physical access control failures. 5) Engage with Gallagher for firmware updates or patches addressing this vulnerability and plan timely deployment once available. 6) Conduct regular security audits and penetration tests focusing on physical access points to identify and remediate potential exploitation vectors. 7) Train security personnel to recognize and respond to physical tampering attempts targeting access control readers.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Italy, Spain
CVE-2025-44003: CWE-772 Missing Release of Resource after Effective Lifetime in Gallagher T-Series Readers
Description
Missing Release of Resource after Effective Lifetime (CWE-772) in the Gallagher T-Series Reader allows an attacker with physical access to the reader to perform a limited denial of service when 125 kHz Card Technology is enabled. This issue affects T-Series Readers: 9.20 prior to vCR9.20.250213a (distributed in 9.20.1827 (MR2)), 9.10 prior to vCR9.10.250213a (distributed in 9.10.2692(MR5)), 9.00 prior to vCR9.00.250619a (distributed in vEL9.00.3371 (MR7)), all versions of 8.90 and prior.
AI-Powered Analysis
Technical Analysis
CVE-2025-44003 is a medium-severity vulnerability identified in Gallagher T-Series Readers, specifically affecting versions prior to vCR9.20.250213a, vCR9.10.250213a, and vCR9.00.250619a, as well as all versions of 8.90 and earlier. The vulnerability is classified under CWE-772, which pertains to the missing release of a resource after its effective lifetime. In this context, the resource in question is related to the 125 kHz card technology functionality within the reader. The flaw allows an attacker with physical access to the reader to trigger a limited denial of service (DoS) condition. This occurs because the reader fails to properly release resources after their intended use, leading to resource exhaustion or lock-up states that degrade the device's availability. The attack vector requires physical proximity or access, as remote exploitation is not indicated. No authentication or user interaction is necessary beyond physical access. The CVSS v3.1 score is 4.3, reflecting a low attack vector (adjacent network), low complexity, no privileges required, no user interaction, and impact limited to availability only. There are no known exploits in the wild, and no official patches have been linked yet. This vulnerability could disrupt access control systems relying on these readers, potentially causing operational interruptions in facilities using Gallagher T-Series Readers with 125 kHz card technology enabled.
Potential Impact
For European organizations, the impact of CVE-2025-44003 primarily concerns physical security and operational continuity. Gallagher T-Series Readers are commonly deployed in physical access control systems across various sectors including corporate offices, government buildings, healthcare facilities, and critical infrastructure sites. A successful exploitation could cause temporary denial of service of the reader, preventing legitimate access and potentially causing workflow disruptions or security lapses. While the vulnerability does not compromise confidentiality or integrity, the availability impact could delay entry or exit, affecting security personnel response times and operational efficiency. Facilities with high reliance on 125 kHz card technology are more vulnerable, especially where physical access to readers is less controlled. In environments with strict regulatory compliance requirements (e.g., GDPR, NIS Directive), any disruption to security controls could have compliance implications. However, since exploitation requires physical access, the threat is somewhat mitigated by existing physical security measures.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Immediately assess the versions of Gallagher T-Series Readers deployed and identify those running affected firmware versions. 2) Implement strict physical security controls around reader hardware to prevent unauthorized physical access, including surveillance, tamper detection, and secure mounting. 3) Disable or phase out the use of 125 kHz card technology where possible, migrating to more secure authentication methods such as higher frequency RFID or smart cards. 4) Monitor reader behavior for signs of resource exhaustion or denial of service conditions and establish incident response procedures for physical access control failures. 5) Engage with Gallagher for firmware updates or patches addressing this vulnerability and plan timely deployment once available. 6) Conduct regular security audits and penetration tests focusing on physical access points to identify and remediate potential exploitation vectors. 7) Train security personnel to recognize and respond to physical tampering attempts targeting access control readers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Gallagher
- Date Reserved
- 2025-06-17T02:18:59.237Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686f307ba83201eaaca4840b
Added to database: 7/10/2025, 3:16:11 AM
Last enriched: 7/10/2025, 3:32:54 AM
Last updated: 8/8/2025, 9:10:13 AM
Views: 14
Related Threats
CVE-2025-9011: SQL Injection in PHPGurukul Online Shopping Portal Project
MediumCVE-2025-9010: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9009: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-31961: CWE-1220 Insufficient Granularity of Access Control in HCL Software Connections
LowCVE-2025-9008: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.