Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48428: CWE-312 Cleartext Storage of Sensitive Information in Gallagher Command Centre Server

0
Medium
VulnerabilityCVE-2025-48428cvecve-2025-48428cwe-312
Published: Thu Oct 23 2025 (10/23/2025, 03:39:07 UTC)
Source: CVE Database V5
Vendor/Project: Gallagher
Product: Command Centre Server

Description

Cleartext Storage of Sensitive Information (CWE-312) in the Gallagher Morpho integration could allow an authenticated user with access to the Command Centre Server to export a specific signing key while in use allowing them to deploy a compromised or counterfeit device on that site. This issue affects Command Centre Server: 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior.

AI-Powered Analysis

AILast updated: 10/23/2025, 04:08:54 UTC

Technical Analysis

CVE-2025-48428 is a vulnerability categorized under CWE-312 (Cleartext Storage of Sensitive Information) found in the Gallagher Command Centre Server, specifically affecting the Gallagher Morpho integration. The issue arises because sensitive signing keys used to authenticate devices are stored in cleartext and can be exported by any authenticated user with access to the Command Centre Server. This flaw allows an attacker with legitimate credentials to extract these keys and subsequently deploy compromised or counterfeit devices within the physical security environment managed by the Command Centre Server. The vulnerability affects versions 8.90 and prior, as well as versions 9.00, 9.10, and 9.20 prior to their respective patch releases (vEL9.00.3831 MR8, vEL9.10.3672 MR7, vEL9.20.2819 MR4). The CVSS v3.1 base score is 6.7, reflecting a medium severity level, with attack vector local (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). This means exploitation requires authenticated access but no further user action, and successful exploitation can lead to significant compromise of the physical security system’s trust model. No public exploits are known at this time, but the vulnerability poses a risk to organizations relying on Gallagher’s Command Centre for physical access control and device authentication. The ability to deploy counterfeit devices undermines the integrity of the security infrastructure and could facilitate unauthorized physical access or sabotage.

Potential Impact

For European organizations, this vulnerability poses a significant risk to physical security systems that rely on Gallagher Command Centre Server, particularly in sectors such as critical infrastructure, government, transportation, and large enterprises. The ability to export signing keys and deploy counterfeit devices could lead to unauthorized physical access, data breaches, sabotage, or espionage. This undermines the trustworthiness of access control systems and could have cascading effects on operational continuity and safety. Given the medium CVSS score and the requirement for authenticated access, insider threats or compromised credentials are the most likely exploitation vectors. The impact on confidentiality, integrity, and availability is high, as attackers can manipulate device authentication and potentially disable or bypass security controls. European organizations with stringent regulatory requirements for physical security and data protection may face compliance risks if this vulnerability is exploited.

Mitigation Recommendations

1. Apply Gallagher’s official patches and updates as soon as they become available for the affected Command Centre Server versions. 2. Restrict access to the Command Centre Server to only highly trusted and necessary personnel, implementing strict role-based access controls (RBAC) to limit who can export signing keys. 3. Monitor and audit all key export activities and access logs for unusual or unauthorized actions, using Security Information and Event Management (SIEM) tools where possible. 4. Implement multi-factor authentication (MFA) for all users accessing the Command Centre Server to reduce the risk of credential compromise. 5. Segregate the Command Centre Server network segment from general IT networks to reduce the attack surface. 6. Conduct regular security awareness training for personnel with access to the Command Centre Server to recognize and report suspicious activities. 7. Consider additional compensating controls such as hardware security modules (HSMs) for key storage if supported by the vendor. 8. Engage with Gallagher support for guidance on secure configuration and any interim mitigations prior to patch deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Gallagher
Date Reserved
2025-06-17T02:18:59.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f9a9e6102015466a330ffd

Added to database: 10/23/2025, 4:07:02 AM

Last enriched: 10/23/2025, 4:08:54 AM

Last updated: 10/23/2025, 7:06:14 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats