Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47699: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Gallagher Command Centre Server

0
Critical
VulnerabilityCVE-2025-47699cvecve-2025-47699cwe-497
Published: Thu Oct 23 2025 (10/23/2025, 03:38:46 UTC)
Source: CVE Database V5
Vendor/Project: Gallagher
Product: Command Centre Server

Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) in the Gallagher Morpho integration could allow an authenticated operator with limited site permissions to make critical changes to local Morpho devices. This issue affects Command Centre Server: 9.30 prior to vEL9.30.2482 (MR2), 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior.

AI-Powered Analysis

AILast updated: 10/30/2025, 04:41:55 UTC

Technical Analysis

CVE-2025-47699 is a critical security vulnerability classified under CWE-497, which pertains to the exposure of sensitive system information to unauthorized control spheres. This vulnerability specifically affects the Gallagher Command Centre Server, a widely used physical security management platform, particularly its integration with Gallagher Morpho biometric devices. The flaw allows an authenticated operator who possesses limited site permissions to escalate their control and make critical changes to local Morpho devices. This unauthorized control could lead to manipulation of biometric access controls, potentially allowing attackers to bypass security measures or disrupt security operations. The affected versions include all releases prior to vEL9.30.2482 (MR2) for 9.30, vEL9.20.2819 (MR4) for 9.20, vEL9.10.3672 (MR7) for 9.10, vEL9.00.3831 (MR8) for 9.00, and all versions of 8.90 and earlier. The vulnerability has a CVSS v3.1 score of 9.9, reflecting its critical nature with network attack vector, low attack complexity, required privileges, no user interaction, and a scope change that impacts confidentiality, integrity, and availability at a high level. Although no exploits are currently known in the wild, the potential for severe security breaches is significant, especially in environments relying heavily on biometric access controls for physical security. The vulnerability highlights the risk of insufficient access control and information exposure within integrated security systems, emphasizing the need for robust privilege management and patching strategies.

Potential Impact

For European organizations, the impact of CVE-2025-47699 could be substantial, particularly for those in critical infrastructure, government, finance, and large enterprises that rely on Gallagher Command Centre for physical security management. Exploitation could lead to unauthorized modification of biometric devices, enabling attackers to bypass access controls, compromise secure areas, or disrupt security operations. This could result in data breaches, physical security incidents, and operational downtime. The exposure of sensitive system information also increases the risk of further targeted attacks by providing attackers with detailed system insights. Given the criticality of physical security in sectors such as energy, transportation, and public administration across Europe, the vulnerability poses a direct threat to organizational safety and regulatory compliance, including GDPR requirements for protecting sensitive information. The potential for cascading effects on integrated security systems further amplifies the risk.

Mitigation Recommendations

1. Immediate application of vendor-released patches or updates for Gallagher Command Centre Server to versions vEL9.30.2482 (MR2), vEL9.20.2819 (MR4), vEL9.10.3672 (MR7), or vEL9.00.3831 (MR8) or later. 2. Restrict and audit operator permissions rigorously to ensure that only trusted personnel have access to Morpho device controls, minimizing the risk of privilege escalation. 3. Implement network segmentation to isolate Command Centre Servers and biometric devices from general user networks, reducing exposure to unauthorized access. 4. Enable detailed logging and monitoring of all operator actions related to Morpho devices to detect anomalous or unauthorized changes promptly. 5. Conduct regular security assessments and penetration testing focused on access control mechanisms within the Command Centre environment. 6. Educate operators and administrators about the risks associated with privilege misuse and enforce strict authentication policies, including multi-factor authentication where supported. 7. Maintain an incident response plan tailored to physical security system compromises to ensure rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Gallagher
Date Reserved
2025-06-17T02:18:59.279Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f9a9e6102015466a330ffa

Added to database: 10/23/2025, 4:07:02 AM

Last enriched: 10/30/2025, 4:41:55 AM

Last updated: 12/7/2025, 9:28:00 AM

Views: 193

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats