Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47147: CWE-312 Cleartext Storage of Sensitive Information in Gallagher Command Centre Mobile Client

0
Medium
VulnerabilityCVE-2025-47147cvecve-2025-47147cwe-312
Published: Tue Mar 03 2026 (03/03/2026, 02:39:30 UTC)
Source: CVE Database V5
Vendor/Project: Gallagher
Product: Command Centre Mobile Client

Description

CVE-2025-47147 is a medium severity vulnerability in Gallagher's Command Centre Mobile Client for Android and iOS versions prior to 9. 40. 123. It involves cleartext storage of sensitive information, specifically session tokens, on the mobile device. An attacker with physical or logical access to a logged-in operator's device could extract these tokens and gain unauthorized access for a limited time. Exploitation requires high privileges and local access, with no user interaction needed. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits are currently reported in the wild. Organizations using affected versions should upgrade promptly to mitigate risk. This threat primarily affects entities relying on Gallagher's security management solutions, especially in sectors with high physical security demands.

AI-Powered Analysis

AILast updated: 03/03/2026, 03:33:08 UTC

Technical Analysis

CVE-2025-47147 is a vulnerability classified under CWE-312, indicating cleartext storage of sensitive information within the Gallagher Command Centre Mobile Client application on Android and iOS platforms. The flaw exists in versions prior to 9.40.123, where session tokens used for authenticating operators are stored unencrypted on the device. This insecure storage allows an attacker who gains access to a logged-in operator's mobile device—either physically or through malware with elevated privileges—to extract these tokens. With the stolen session token, the attacker can impersonate the operator and access the Command Centre system for a limited duration until the token expires or is invalidated. The vulnerability does not require user interaction but does require the attacker to have high privileges on the device, limiting remote exploitation. The CVSS v3.1 score is 5.7 (medium), reflecting the attack vector as local, high attack complexity, and high privileges required. The impact affects confidentiality and integrity by enabling unauthorized access but does not impact availability. No patches or exploits in the wild are currently documented, but the risk remains significant for environments where mobile device security is weak or devices are lost or stolen. Gallagher Command Centre is widely used in physical security management, making this vulnerability relevant to organizations managing access control and security operations.

Potential Impact

The primary impact of this vulnerability is unauthorized access to the Gallagher Command Centre system through stolen session tokens, compromising confidentiality and integrity of security operations. Attackers could potentially manipulate security settings, view sensitive access logs, or disrupt monitoring by impersonating legitimate operators. This could lead to unauthorized physical access, data breaches, or sabotage of security infrastructure. The limited duration of token validity somewhat constrains the window of exploitation, but persistent attackers with repeated access to devices could maintain unauthorized access. Organizations with high reliance on mobile clients for security management, such as critical infrastructure, government facilities, and large enterprises, face elevated risks. The vulnerability does not directly affect system availability but undermines trust in security controls and operator authentication. The requirement for local high privilege access reduces the likelihood of widespread remote exploitation but highlights the importance of mobile device security hygiene.

Mitigation Recommendations

Organizations should immediately upgrade the Gallagher Command Centre Mobile Client to version 9.40.123 or later, where this vulnerability is addressed. Until upgrades are deployed, enforce strict mobile device management (MDM) policies including strong device encryption, secure lock screens, and remote wipe capabilities to reduce risk from lost or stolen devices. Limit operator privileges on mobile devices and monitor for unusual access patterns to detect potential token misuse. Educate operators on the importance of device security and the risks of leaving devices unattended or jailbroken/rooted. Implement network-level controls to restrict Command Centre access to trusted devices and IP ranges. Regularly audit session token lifetimes and consider reducing token validity periods to minimize exposure. Finally, Gallagher should provide a patch or update with encrypted token storage and consider multi-factor authentication to further protect session integrity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Gallagher
Date Reserved
2025-06-17T02:18:59.232Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a652fcd1a09e29cba9d616

Added to database: 3/3/2026, 3:18:20 AM

Last enriched: 3/3/2026, 3:33:08 AM

Last updated: 3/3/2026, 5:24:47 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses