CVE-2025-47699: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Gallagher Command Centre Server
Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) in the Gallagher Morpho integration could allow an authenticated operator with limited site permissions to make critical changes to local Morpho devices. This issue affects Command Centre Server: 9.30 prior to vEL9.30.2482 (MR2), 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior.
AI Analysis
Technical Summary
CVE-2025-47699 is a critical security vulnerability classified under CWE-497, which pertains to the exposure of sensitive system information to unauthorized control spheres. This vulnerability specifically affects the Gallagher Command Centre Server, a widely used physical security management platform, particularly its integration with Gallagher Morpho biometric devices. The flaw allows an authenticated operator who possesses limited site permissions to escalate their control and make critical changes to local Morpho devices. This unauthorized control could lead to manipulation of biometric access controls, potentially allowing attackers to bypass security measures or disrupt security operations. The affected versions include all releases prior to vEL9.30.2482 (MR2) for 9.30, vEL9.20.2819 (MR4) for 9.20, vEL9.10.3672 (MR7) for 9.10, vEL9.00.3831 (MR8) for 9.00, and all versions of 8.90 and earlier. The vulnerability has a CVSS v3.1 score of 9.9, reflecting its critical nature with network attack vector, low attack complexity, required privileges, no user interaction, and a scope change that impacts confidentiality, integrity, and availability at a high level. Although no exploits are currently known in the wild, the potential for severe security breaches is significant, especially in environments relying heavily on biometric access controls for physical security. The vulnerability highlights the risk of insufficient access control and information exposure within integrated security systems, emphasizing the need for robust privilege management and patching strategies.
Potential Impact
For European organizations, the impact of CVE-2025-47699 could be substantial, particularly for those in critical infrastructure, government, finance, and large enterprises that rely on Gallagher Command Centre for physical security management. Exploitation could lead to unauthorized modification of biometric devices, enabling attackers to bypass access controls, compromise secure areas, or disrupt security operations. This could result in data breaches, physical security incidents, and operational downtime. The exposure of sensitive system information also increases the risk of further targeted attacks by providing attackers with detailed system insights. Given the criticality of physical security in sectors such as energy, transportation, and public administration across Europe, the vulnerability poses a direct threat to organizational safety and regulatory compliance, including GDPR requirements for protecting sensitive information. The potential for cascading effects on integrated security systems further amplifies the risk.
Mitigation Recommendations
1. Immediate application of vendor-released patches or updates for Gallagher Command Centre Server to versions vEL9.30.2482 (MR2), vEL9.20.2819 (MR4), vEL9.10.3672 (MR7), or vEL9.00.3831 (MR8) or later. 2. Restrict and audit operator permissions rigorously to ensure that only trusted personnel have access to Morpho device controls, minimizing the risk of privilege escalation. 3. Implement network segmentation to isolate Command Centre Servers and biometric devices from general user networks, reducing exposure to unauthorized access. 4. Enable detailed logging and monitoring of all operator actions related to Morpho devices to detect anomalous or unauthorized changes promptly. 5. Conduct regular security assessments and penetration testing focused on access control mechanisms within the Command Centre environment. 6. Educate operators and administrators about the risks associated with privilege misuse and enforce strict authentication policies, including multi-factor authentication where supported. 7. Maintain an incident response plan tailored to physical security system compromises to ensure rapid containment and recovery.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Norway, Belgium, Italy, Spain, Poland
CVE-2025-47699: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Gallagher Command Centre Server
Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) in the Gallagher Morpho integration could allow an authenticated operator with limited site permissions to make critical changes to local Morpho devices. This issue affects Command Centre Server: 9.30 prior to vEL9.30.2482 (MR2), 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior.
AI-Powered Analysis
Technical Analysis
CVE-2025-47699 is a critical security vulnerability classified under CWE-497, which pertains to the exposure of sensitive system information to unauthorized control spheres. This vulnerability specifically affects the Gallagher Command Centre Server, a widely used physical security management platform, particularly its integration with Gallagher Morpho biometric devices. The flaw allows an authenticated operator who possesses limited site permissions to escalate their control and make critical changes to local Morpho devices. This unauthorized control could lead to manipulation of biometric access controls, potentially allowing attackers to bypass security measures or disrupt security operations. The affected versions include all releases prior to vEL9.30.2482 (MR2) for 9.30, vEL9.20.2819 (MR4) for 9.20, vEL9.10.3672 (MR7) for 9.10, vEL9.00.3831 (MR8) for 9.00, and all versions of 8.90 and earlier. The vulnerability has a CVSS v3.1 score of 9.9, reflecting its critical nature with network attack vector, low attack complexity, required privileges, no user interaction, and a scope change that impacts confidentiality, integrity, and availability at a high level. Although no exploits are currently known in the wild, the potential for severe security breaches is significant, especially in environments relying heavily on biometric access controls for physical security. The vulnerability highlights the risk of insufficient access control and information exposure within integrated security systems, emphasizing the need for robust privilege management and patching strategies.
Potential Impact
For European organizations, the impact of CVE-2025-47699 could be substantial, particularly for those in critical infrastructure, government, finance, and large enterprises that rely on Gallagher Command Centre for physical security management. Exploitation could lead to unauthorized modification of biometric devices, enabling attackers to bypass access controls, compromise secure areas, or disrupt security operations. This could result in data breaches, physical security incidents, and operational downtime. The exposure of sensitive system information also increases the risk of further targeted attacks by providing attackers with detailed system insights. Given the criticality of physical security in sectors such as energy, transportation, and public administration across Europe, the vulnerability poses a direct threat to organizational safety and regulatory compliance, including GDPR requirements for protecting sensitive information. The potential for cascading effects on integrated security systems further amplifies the risk.
Mitigation Recommendations
1. Immediate application of vendor-released patches or updates for Gallagher Command Centre Server to versions vEL9.30.2482 (MR2), vEL9.20.2819 (MR4), vEL9.10.3672 (MR7), or vEL9.00.3831 (MR8) or later. 2. Restrict and audit operator permissions rigorously to ensure that only trusted personnel have access to Morpho device controls, minimizing the risk of privilege escalation. 3. Implement network segmentation to isolate Command Centre Servers and biometric devices from general user networks, reducing exposure to unauthorized access. 4. Enable detailed logging and monitoring of all operator actions related to Morpho devices to detect anomalous or unauthorized changes promptly. 5. Conduct regular security assessments and penetration testing focused on access control mechanisms within the Command Centre environment. 6. Educate operators and administrators about the risks associated with privilege misuse and enforce strict authentication policies, including multi-factor authentication where supported. 7. Maintain an incident response plan tailored to physical security system compromises to ensure rapid containment and recovery.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Gallagher
- Date Reserved
- 2025-06-17T02:18:59.279Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f9a9e6102015466a330ffa
Added to database: 10/23/2025, 4:07:02 AM
Last enriched: 10/30/2025, 4:41:55 AM
Last updated: 12/7/2025, 9:28:00 AM
Views: 193
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14187: Buffer Overflow in UGREEN DH2100+
HighCVE-2025-14186: Basic Cross Site Scripting in Grandstream GXP1625
MediumCVE-2025-14185: SQL Injection in Yonyou U8 Cloud
MediumCVE-2025-14184: Command Injection in SGAI Space1 NAS N1211DS
MediumCVE-2025-14183: Unprotected Storage of Credentials in SGAI Space1 NAS N1211DS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.