CVE-2025-47699: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Gallagher Command Centre Server
Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) in the Gallagher Morpho integration could allow an authenticated operator with limited site permissions to make critical changes to local Morpho devices. This issue affects Command Centre Server: 9.30 prior to vEL9.30.2482 (MR2), 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior.
AI Analysis
Technical Summary
CVE-2025-47699 is a critical security vulnerability identified in the Gallagher Command Centre Server, specifically related to the Gallagher Morpho biometric integration. The issue is classified under CWE-497, which pertains to the exposure of sensitive system information to an unauthorized control sphere. This vulnerability allows an authenticated operator, who normally has limited site permissions, to escalate their control and make critical unauthorized changes to local Morpho biometric devices. The affected versions include all releases prior to vEL9.30.2482 (MR2) for version 9.30, vEL9.20.2819 (MR4) for 9.20, vEL9.10.3672 (MR7) for 9.10, vEL9.00.3831 (MR8) for 9.00, and all versions of 8.90 and earlier. The vulnerability is remotely exploitable (AV:N) with low attack complexity (AC:L), requiring only privileges of a limited authenticated operator (PR:L), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially compromised security scope. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflecting the potential for significant unauthorized access and control over biometric devices, which are critical for physical security enforcement. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a high-risk vulnerability for organizations using Gallagher Command Centre Server in their security infrastructure.
Potential Impact
For European organizations, the impact of CVE-2025-47699 is substantial due to the critical role Gallagher Command Centre Server plays in managing physical security systems, including biometric access controls via Morpho devices. Unauthorized changes to these devices could lead to unauthorized physical access, compromising sensitive facilities such as government buildings, data centers, transportation hubs, and critical infrastructure. This could result in data breaches, sabotage, theft, or disruption of operations. The high CVSS score reflects the potential for complete compromise of the biometric authentication system, undermining trust in physical security controls. Organizations relying on Gallagher systems for compliance with security regulations may face legal and reputational consequences if exploited. The vulnerability also increases insider threat risks, as operators with limited permissions could escalate privileges and bypass security policies. Given the interconnected nature of physical and cybersecurity, exploitation could facilitate further cyber intrusions or lateral movement within enterprise networks.
Mitigation Recommendations
To mitigate CVE-2025-47699, European organizations should prioritize upgrading Gallagher Command Centre Server to the fixed versions: vEL9.30.2482 (MR2) or later for 9.30, vEL9.20.2819 (MR4) or later for 9.20, vEL9.10.3672 (MR7) or later for 9.10, and vEL9.00.3831 (MR8) or later for 9.00. For versions 8.90 and earlier, immediate upgrade or replacement is critical. Until patches are applied, organizations should restrict operator permissions rigorously, ensuring that only fully trusted personnel have access to Morpho device configurations. Implement strict role-based access controls (RBAC) and monitor logs for unusual configuration changes or access patterns. Employ network segmentation to isolate Command Centre Servers and biometric devices from general IT networks, reducing attack surface exposure. Conduct regular audits of physical security device configurations and operator activities. Additionally, consider deploying intrusion detection systems (IDS) tailored to detect anomalous commands or configuration changes in the Gallagher environment. Establish incident response plans specifically addressing physical security system compromises. Engage with Gallagher support for any available interim mitigations or guidance.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Norway, Belgium, Switzerland
CVE-2025-47699: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Gallagher Command Centre Server
Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) in the Gallagher Morpho integration could allow an authenticated operator with limited site permissions to make critical changes to local Morpho devices. This issue affects Command Centre Server: 9.30 prior to vEL9.30.2482 (MR2), 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior.
AI-Powered Analysis
Technical Analysis
CVE-2025-47699 is a critical security vulnerability identified in the Gallagher Command Centre Server, specifically related to the Gallagher Morpho biometric integration. The issue is classified under CWE-497, which pertains to the exposure of sensitive system information to an unauthorized control sphere. This vulnerability allows an authenticated operator, who normally has limited site permissions, to escalate their control and make critical unauthorized changes to local Morpho biometric devices. The affected versions include all releases prior to vEL9.30.2482 (MR2) for version 9.30, vEL9.20.2819 (MR4) for 9.20, vEL9.10.3672 (MR7) for 9.10, vEL9.00.3831 (MR8) for 9.00, and all versions of 8.90 and earlier. The vulnerability is remotely exploitable (AV:N) with low attack complexity (AC:L), requiring only privileges of a limited authenticated operator (PR:L), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially compromised security scope. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflecting the potential for significant unauthorized access and control over biometric devices, which are critical for physical security enforcement. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a high-risk vulnerability for organizations using Gallagher Command Centre Server in their security infrastructure.
Potential Impact
For European organizations, the impact of CVE-2025-47699 is substantial due to the critical role Gallagher Command Centre Server plays in managing physical security systems, including biometric access controls via Morpho devices. Unauthorized changes to these devices could lead to unauthorized physical access, compromising sensitive facilities such as government buildings, data centers, transportation hubs, and critical infrastructure. This could result in data breaches, sabotage, theft, or disruption of operations. The high CVSS score reflects the potential for complete compromise of the biometric authentication system, undermining trust in physical security controls. Organizations relying on Gallagher systems for compliance with security regulations may face legal and reputational consequences if exploited. The vulnerability also increases insider threat risks, as operators with limited permissions could escalate privileges and bypass security policies. Given the interconnected nature of physical and cybersecurity, exploitation could facilitate further cyber intrusions or lateral movement within enterprise networks.
Mitigation Recommendations
To mitigate CVE-2025-47699, European organizations should prioritize upgrading Gallagher Command Centre Server to the fixed versions: vEL9.30.2482 (MR2) or later for 9.30, vEL9.20.2819 (MR4) or later for 9.20, vEL9.10.3672 (MR7) or later for 9.10, and vEL9.00.3831 (MR8) or later for 9.00. For versions 8.90 and earlier, immediate upgrade or replacement is critical. Until patches are applied, organizations should restrict operator permissions rigorously, ensuring that only fully trusted personnel have access to Morpho device configurations. Implement strict role-based access controls (RBAC) and monitor logs for unusual configuration changes or access patterns. Employ network segmentation to isolate Command Centre Servers and biometric devices from general IT networks, reducing attack surface exposure. Conduct regular audits of physical security device configurations and operator activities. Additionally, consider deploying intrusion detection systems (IDS) tailored to detect anomalous commands or configuration changes in the Gallagher environment. Establish incident response plans specifically addressing physical security system compromises. Engage with Gallagher support for any available interim mitigations or guidance.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Gallagher
- Date Reserved
- 2025-06-17T02:18:59.279Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f9a9e6102015466a330ffa
Added to database: 10/23/2025, 4:07:02 AM
Last enriched: 10/23/2025, 4:08:30 AM
Last updated: 10/23/2025, 8:08:20 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62499: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2025-61865: Unquoted search path or element in I-O DATA DEVICE, INC. NarSuS App
MediumCVE-2025-54856: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2025-54806: Cross-site scripting (XSS) in GROWI, Inc. GROWI
MediumCVE-2025-48430: CWE-248 Uncaught Exception in Gallagher Command Centre Server
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.