CVE-2025-47147: CWE-312 Cleartext Storage of Sensitive Information in Gallagher Command Centre Mobile Client
CVE-2025-47147 is a medium severity vulnerability in Gallagher's Command Centre Mobile Client for Android and iOS versions prior to 9. 40. 123. It involves cleartext storage of sensitive information, specifically session tokens, on the mobile device. An attacker with physical or logical access to a logged-in operator's device could extract these tokens and gain unauthorized access for a limited time. Exploitation requires high privileges and local access, with no user interaction needed. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits are currently reported in the wild. Organizations using affected versions should upgrade promptly to mitigate risk. This threat primarily affects entities relying on Gallagher's security management solutions, especially in sectors with high physical security demands.
AI Analysis
Technical Summary
CVE-2025-47147 is a vulnerability classified under CWE-312, indicating cleartext storage of sensitive information within the Gallagher Command Centre Mobile Client application on Android and iOS platforms. The flaw exists in versions prior to 9.40.123, where session tokens used for authenticating operators are stored unencrypted on the device. This insecure storage allows an attacker who gains access to a logged-in operator's mobile device—either physically or through malware with elevated privileges—to extract these tokens. With the stolen session token, the attacker can impersonate the operator and access the Command Centre system for a limited duration until the token expires or is invalidated. The vulnerability does not require user interaction but does require the attacker to have high privileges on the device, limiting remote exploitation. The CVSS v3.1 score is 5.7 (medium), reflecting the attack vector as local, high attack complexity, and high privileges required. The impact affects confidentiality and integrity by enabling unauthorized access but does not impact availability. No patches or exploits in the wild are currently documented, but the risk remains significant for environments where mobile device security is weak or devices are lost or stolen. Gallagher Command Centre is widely used in physical security management, making this vulnerability relevant to organizations managing access control and security operations.
Potential Impact
The primary impact of this vulnerability is unauthorized access to the Gallagher Command Centre system through stolen session tokens, compromising confidentiality and integrity of security operations. Attackers could potentially manipulate security settings, view sensitive access logs, or disrupt monitoring by impersonating legitimate operators. This could lead to unauthorized physical access, data breaches, or sabotage of security infrastructure. The limited duration of token validity somewhat constrains the window of exploitation, but persistent attackers with repeated access to devices could maintain unauthorized access. Organizations with high reliance on mobile clients for security management, such as critical infrastructure, government facilities, and large enterprises, face elevated risks. The vulnerability does not directly affect system availability but undermines trust in security controls and operator authentication. The requirement for local high privilege access reduces the likelihood of widespread remote exploitation but highlights the importance of mobile device security hygiene.
Mitigation Recommendations
Organizations should immediately upgrade the Gallagher Command Centre Mobile Client to version 9.40.123 or later, where this vulnerability is addressed. Until upgrades are deployed, enforce strict mobile device management (MDM) policies including strong device encryption, secure lock screens, and remote wipe capabilities to reduce risk from lost or stolen devices. Limit operator privileges on mobile devices and monitor for unusual access patterns to detect potential token misuse. Educate operators on the importance of device security and the risks of leaving devices unattended or jailbroken/rooted. Implement network-level controls to restrict Command Centre access to trusted devices and IP ranges. Regularly audit session token lifetimes and consider reducing token validity periods to minimize exposure. Finally, Gallagher should provide a patch or update with encrypted token storage and consider multi-factor authentication to further protect session integrity.
Affected Countries
United States, United Kingdom, Australia, Canada, Germany, France, Japan, Netherlands, United Arab Emirates, Singapore
CVE-2025-47147: CWE-312 Cleartext Storage of Sensitive Information in Gallagher Command Centre Mobile Client
Description
CVE-2025-47147 is a medium severity vulnerability in Gallagher's Command Centre Mobile Client for Android and iOS versions prior to 9. 40. 123. It involves cleartext storage of sensitive information, specifically session tokens, on the mobile device. An attacker with physical or logical access to a logged-in operator's device could extract these tokens and gain unauthorized access for a limited time. Exploitation requires high privileges and local access, with no user interaction needed. The vulnerability impacts confidentiality and integrity but does not affect availability. No known exploits are currently reported in the wild. Organizations using affected versions should upgrade promptly to mitigate risk. This threat primarily affects entities relying on Gallagher's security management solutions, especially in sectors with high physical security demands.
AI-Powered Analysis
Technical Analysis
CVE-2025-47147 is a vulnerability classified under CWE-312, indicating cleartext storage of sensitive information within the Gallagher Command Centre Mobile Client application on Android and iOS platforms. The flaw exists in versions prior to 9.40.123, where session tokens used for authenticating operators are stored unencrypted on the device. This insecure storage allows an attacker who gains access to a logged-in operator's mobile device—either physically or through malware with elevated privileges—to extract these tokens. With the stolen session token, the attacker can impersonate the operator and access the Command Centre system for a limited duration until the token expires or is invalidated. The vulnerability does not require user interaction but does require the attacker to have high privileges on the device, limiting remote exploitation. The CVSS v3.1 score is 5.7 (medium), reflecting the attack vector as local, high attack complexity, and high privileges required. The impact affects confidentiality and integrity by enabling unauthorized access but does not impact availability. No patches or exploits in the wild are currently documented, but the risk remains significant for environments where mobile device security is weak or devices are lost or stolen. Gallagher Command Centre is widely used in physical security management, making this vulnerability relevant to organizations managing access control and security operations.
Potential Impact
The primary impact of this vulnerability is unauthorized access to the Gallagher Command Centre system through stolen session tokens, compromising confidentiality and integrity of security operations. Attackers could potentially manipulate security settings, view sensitive access logs, or disrupt monitoring by impersonating legitimate operators. This could lead to unauthorized physical access, data breaches, or sabotage of security infrastructure. The limited duration of token validity somewhat constrains the window of exploitation, but persistent attackers with repeated access to devices could maintain unauthorized access. Organizations with high reliance on mobile clients for security management, such as critical infrastructure, government facilities, and large enterprises, face elevated risks. The vulnerability does not directly affect system availability but undermines trust in security controls and operator authentication. The requirement for local high privilege access reduces the likelihood of widespread remote exploitation but highlights the importance of mobile device security hygiene.
Mitigation Recommendations
Organizations should immediately upgrade the Gallagher Command Centre Mobile Client to version 9.40.123 or later, where this vulnerability is addressed. Until upgrades are deployed, enforce strict mobile device management (MDM) policies including strong device encryption, secure lock screens, and remote wipe capabilities to reduce risk from lost or stolen devices. Limit operator privileges on mobile devices and monitor for unusual access patterns to detect potential token misuse. Educate operators on the importance of device security and the risks of leaving devices unattended or jailbroken/rooted. Implement network-level controls to restrict Command Centre access to trusted devices and IP ranges. Regularly audit session token lifetimes and consider reducing token validity periods to minimize exposure. Finally, Gallagher should provide a patch or update with encrypted token storage and consider multi-factor authentication to further protect session integrity.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gallagher
- Date Reserved
- 2025-06-17T02:18:59.232Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a652fcd1a09e29cba9d616
Added to database: 3/3/2026, 3:18:20 AM
Last enriched: 3/3/2026, 3:33:08 AM
Last updated: 3/3/2026, 5:24:47 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-3455: Cross-site Scripting (XSS) in mailparser
MediumCVE-2026-3449: Incorrect Control Flow Scoping in @tootallnate/once
MediumCVE-2026-1492: CWE-269 Improper Privilege Management in wpeverest User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder
CriticalCVE-2026-20801: CWE-319 Cleartext Transmission of Sensitive Information in Gallagher NxWitness VMS and Hanwha VMS Integrations
MediumCVE-2026-20757: CWE-667 Improper Locking in Gallagher Command Centre Server
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.