CVE-2025-48428: CWE-312 Cleartext Storage of Sensitive Information in Gallagher Command Centre Server
Cleartext Storage of Sensitive Information (CWE-312) in the Gallagher Morpho integration could allow an authenticated user with access to the Command Centre Server to export a specific signing key while in use allowing them to deploy a compromised or counterfeit device on that site. This issue affects Command Centre Server: 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior.
AI Analysis
Technical Summary
CVE-2025-48428 is a vulnerability classified under CWE-312, which pertains to the cleartext storage of sensitive information. Specifically, in the Gallagher Command Centre Server, versions 8.90 and prior, as well as versions 9.00, 9.10, and 9.20 before their respective patch releases, the Gallagher Morpho integration stores a signing key in cleartext. This signing key is critical for authenticating devices within the physical security ecosystem managed by the Command Centre Server. An authenticated user with access to the server can export this signing key while it is in use. Possession of this key allows the attacker to deploy compromised or counterfeit devices that the system would trust, effectively bypassing physical security controls. The vulnerability requires the attacker to have high privileges on the server (authenticated with high rights), but no further user interaction is needed. The CVSS v3.1 score of 6.7 reflects a medium severity with high impact on confidentiality, integrity, and availability, but limited by the requirement for local access and high privileges. No public exploits have been reported yet, but the risk remains significant due to the potential for physical security compromise. Gallagher has not provided patch links in the data, but affected versions are clearly identified, indicating that patches or mitigations are expected or available in newer releases.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, particularly for those relying on Gallagher Command Centre Server for physical access control and security management. Unauthorized export of the signing key can lead to the deployment of counterfeit or compromised devices that can bypass security controls, potentially allowing unauthorized physical access to sensitive facilities such as government buildings, critical infrastructure, data centers, and corporate headquarters. This can result in data breaches, theft, sabotage, or espionage. The integrity of the physical security system is compromised, and availability may be affected if counterfeit devices disrupt normal operations. Since the vulnerability requires authenticated access with high privileges, insider threats or attackers who have already gained elevated access pose the greatest risk. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in targeted attacks. European organizations must consider this vulnerability in their risk assessments and incident response planning, as physical security breaches can have cascading effects on cybersecurity and operational continuity.
Mitigation Recommendations
1. Immediate upgrade to the latest patched versions of Gallagher Command Centre Server as soon as they become available, ensuring that versions prior to vEL9.20.2819, vEL9.10.3672, and vEL9.00.3831 are replaced. 2. Restrict and monitor administrative access to the Command Centre Server to minimize the risk of an attacker gaining the required high privileges. Implement strict role-based access controls and enforce the principle of least privilege. 3. Conduct regular audits of user accounts and access logs to detect any unauthorized or suspicious activities related to key export or device deployment. 4. Employ network segmentation to isolate the Command Centre Server from less secure network zones, reducing the attack surface. 5. Use multi-factor authentication (MFA) for all administrative access to the Command Centre Server to mitigate risks from compromised credentials. 6. Monitor for anomalous device registrations or deployments within the physical security system that could indicate misuse of the signing key. 7. Engage with Gallagher support or security advisories to obtain official patches or workarounds and apply them promptly. 8. Train security personnel on the risks associated with this vulnerability and the importance of safeguarding administrative credentials and access.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Switzerland, Norway, Belgium, Italy, Spain
CVE-2025-48428: CWE-312 Cleartext Storage of Sensitive Information in Gallagher Command Centre Server
Description
Cleartext Storage of Sensitive Information (CWE-312) in the Gallagher Morpho integration could allow an authenticated user with access to the Command Centre Server to export a specific signing key while in use allowing them to deploy a compromised or counterfeit device on that site. This issue affects Command Centre Server: 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior.
AI-Powered Analysis
Technical Analysis
CVE-2025-48428 is a vulnerability classified under CWE-312, which pertains to the cleartext storage of sensitive information. Specifically, in the Gallagher Command Centre Server, versions 8.90 and prior, as well as versions 9.00, 9.10, and 9.20 before their respective patch releases, the Gallagher Morpho integration stores a signing key in cleartext. This signing key is critical for authenticating devices within the physical security ecosystem managed by the Command Centre Server. An authenticated user with access to the server can export this signing key while it is in use. Possession of this key allows the attacker to deploy compromised or counterfeit devices that the system would trust, effectively bypassing physical security controls. The vulnerability requires the attacker to have high privileges on the server (authenticated with high rights), but no further user interaction is needed. The CVSS v3.1 score of 6.7 reflects a medium severity with high impact on confidentiality, integrity, and availability, but limited by the requirement for local access and high privileges. No public exploits have been reported yet, but the risk remains significant due to the potential for physical security compromise. Gallagher has not provided patch links in the data, but affected versions are clearly identified, indicating that patches or mitigations are expected or available in newer releases.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, particularly for those relying on Gallagher Command Centre Server for physical access control and security management. Unauthorized export of the signing key can lead to the deployment of counterfeit or compromised devices that can bypass security controls, potentially allowing unauthorized physical access to sensitive facilities such as government buildings, critical infrastructure, data centers, and corporate headquarters. This can result in data breaches, theft, sabotage, or espionage. The integrity of the physical security system is compromised, and availability may be affected if counterfeit devices disrupt normal operations. Since the vulnerability requires authenticated access with high privileges, insider threats or attackers who have already gained elevated access pose the greatest risk. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially in targeted attacks. European organizations must consider this vulnerability in their risk assessments and incident response planning, as physical security breaches can have cascading effects on cybersecurity and operational continuity.
Mitigation Recommendations
1. Immediate upgrade to the latest patched versions of Gallagher Command Centre Server as soon as they become available, ensuring that versions prior to vEL9.20.2819, vEL9.10.3672, and vEL9.00.3831 are replaced. 2. Restrict and monitor administrative access to the Command Centre Server to minimize the risk of an attacker gaining the required high privileges. Implement strict role-based access controls and enforce the principle of least privilege. 3. Conduct regular audits of user accounts and access logs to detect any unauthorized or suspicious activities related to key export or device deployment. 4. Employ network segmentation to isolate the Command Centre Server from less secure network zones, reducing the attack surface. 5. Use multi-factor authentication (MFA) for all administrative access to the Command Centre Server to mitigate risks from compromised credentials. 6. Monitor for anomalous device registrations or deployments within the physical security system that could indicate misuse of the signing key. 7. Engage with Gallagher support or security advisories to obtain official patches or workarounds and apply them promptly. 8. Train security personnel on the risks associated with this vulnerability and the importance of safeguarding administrative credentials and access.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Gallagher
- Date Reserved
- 2025-06-17T02:18:59.261Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f9a9e6102015466a330ffd
Added to database: 10/23/2025, 4:07:02 AM
Last enriched: 10/30/2025, 4:35:36 AM
Last updated: 12/6/2025, 8:52:02 AM
Views: 157
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in widgetpack Rich Shortcodes for Google Reviews
HighCVE-2025-13748: CWE-639 Authorization Bypass Through User-Controlled Key in techjewel Fluent Forms – Customizable Contact Forms, Survey, Quiz, & Conversational Form Builder
MediumCVE-2025-13377: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in 10web 10Web Booster – Website speed optimization, Cache & Page Speed optimizer
CriticalCVE-2025-13907: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tunilame CSS3 Buttons
MediumCVE-2025-13899: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pntrinh TR Timthumb
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.