Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47699: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Gallagher Command Centre Server

0
Critical
VulnerabilityCVE-2025-47699cvecve-2025-47699cwe-497
Published: Thu Oct 23 2025 (10/23/2025, 03:38:46 UTC)
Source: CVE Database V5
Vendor/Project: Gallagher
Product: Command Centre Server

Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) in the Gallagher Morpho integration could allow an authenticated operator with limited site permissions to make critical changes to local Morpho devices. This issue affects Command Centre Server: 9.30 prior to vEL9.30.2482 (MR2), 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior.

AI-Powered Analysis

AILast updated: 10/23/2025, 04:08:30 UTC

Technical Analysis

CVE-2025-47699 is a critical security vulnerability identified in the Gallagher Command Centre Server, specifically related to the Gallagher Morpho biometric integration. The issue is classified under CWE-497, which pertains to the exposure of sensitive system information to an unauthorized control sphere. This vulnerability allows an authenticated operator, who normally has limited site permissions, to escalate their control and make critical unauthorized changes to local Morpho biometric devices. The affected versions include all releases prior to vEL9.30.2482 (MR2) for version 9.30, vEL9.20.2819 (MR4) for 9.20, vEL9.10.3672 (MR7) for 9.10, vEL9.00.3831 (MR8) for 9.00, and all versions of 8.90 and earlier. The vulnerability is remotely exploitable (AV:N) with low attack complexity (AC:L), requiring only privileges of a limited authenticated operator (PR:L), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects components beyond the initially compromised security scope. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), reflecting the potential for significant unauthorized access and control over biometric devices, which are critical for physical security enforcement. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a high-risk vulnerability for organizations using Gallagher Command Centre Server in their security infrastructure.

Potential Impact

For European organizations, the impact of CVE-2025-47699 is substantial due to the critical role Gallagher Command Centre Server plays in managing physical security systems, including biometric access controls via Morpho devices. Unauthorized changes to these devices could lead to unauthorized physical access, compromising sensitive facilities such as government buildings, data centers, transportation hubs, and critical infrastructure. This could result in data breaches, sabotage, theft, or disruption of operations. The high CVSS score reflects the potential for complete compromise of the biometric authentication system, undermining trust in physical security controls. Organizations relying on Gallagher systems for compliance with security regulations may face legal and reputational consequences if exploited. The vulnerability also increases insider threat risks, as operators with limited permissions could escalate privileges and bypass security policies. Given the interconnected nature of physical and cybersecurity, exploitation could facilitate further cyber intrusions or lateral movement within enterprise networks.

Mitigation Recommendations

To mitigate CVE-2025-47699, European organizations should prioritize upgrading Gallagher Command Centre Server to the fixed versions: vEL9.30.2482 (MR2) or later for 9.30, vEL9.20.2819 (MR4) or later for 9.20, vEL9.10.3672 (MR7) or later for 9.10, and vEL9.00.3831 (MR8) or later for 9.00. For versions 8.90 and earlier, immediate upgrade or replacement is critical. Until patches are applied, organizations should restrict operator permissions rigorously, ensuring that only fully trusted personnel have access to Morpho device configurations. Implement strict role-based access controls (RBAC) and monitor logs for unusual configuration changes or access patterns. Employ network segmentation to isolate Command Centre Servers and biometric devices from general IT networks, reducing attack surface exposure. Conduct regular audits of physical security device configurations and operator activities. Additionally, consider deploying intrusion detection systems (IDS) tailored to detect anomalous commands or configuration changes in the Gallagher environment. Establish incident response plans specifically addressing physical security system compromises. Engage with Gallagher support for any available interim mitigations or guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Gallagher
Date Reserved
2025-06-17T02:18:59.279Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f9a9e6102015466a330ffa

Added to database: 10/23/2025, 4:07:02 AM

Last enriched: 10/23/2025, 4:08:30 AM

Last updated: 10/23/2025, 8:08:20 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats