Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48430: CWE-248 Uncaught Exception in Gallagher Command Centre Server

0
Medium
VulnerabilityCVE-2025-48430cvecve-2025-48430cwe-248
Published: Thu Oct 23 2025 (10/23/2025, 03:39:31 UTC)
Source: CVE Database V5
Vendor/Project: Gallagher
Product: Command Centre Server

Description

Uncaught Exception (CWE-248) in the Command Centre Server allows an Authorized and Privileged Operator to crash the Command Centre Server at will. This issue affects Command Centre Server: 9.30 prior to vEL9.30.2482 (MR2), 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior.

AI-Powered Analysis

AILast updated: 10/23/2025, 04:09:09 UTC

Technical Analysis

CVE-2025-48430 identifies a vulnerability in Gallagher's Command Centre Server, a widely used physical security management platform. The issue arises from an uncaught exception (classified under CWE-248) that can be deliberately triggered by an authorized and privileged operator, causing the server to crash and become unavailable. The affected versions include all releases prior to vEL9.30.2482 (MR2), vEL9.20.2819 (MR4), vEL9.10.3672 (MR7), vEL9.00.3831 (MR8), and all versions 8.90 and earlier. The vulnerability does not expose confidential data or allow unauthorized changes, but it results in a denial-of-service (DoS) condition impacting system availability. Exploitation requires local access with privileges (AV:L, PR:L) but no user interaction beyond the operator's own actions. The CVSS v3.1 base score is 5.5, reflecting medium severity due to the limited scope and impact. No public exploits are currently known, and no patches were linked at the time of publication, indicating the need for vigilance and prompt patch application once available. This vulnerability could disrupt physical security operations, potentially delaying response times or causing temporary loss of monitoring capabilities.

Potential Impact

For European organizations, the primary impact is on the availability of physical security management systems relying on Gallagher Command Centre Server. A successful exploitation could lead to denial-of-service conditions, temporarily disabling security monitoring and control functions. This disruption could increase the risk of unauthorized physical access or delayed incident response, especially in critical infrastructure sectors such as transportation, energy, government facilities, and large enterprises. While confidentiality and integrity remain unaffected, the availability loss could have cascading effects on operational continuity and safety. Organizations with stringent physical security requirements or regulatory compliance obligations may face operational and reputational risks if the vulnerability is exploited. The requirement for privileged operator access limits the attack surface but underscores the importance of strict access controls and monitoring of privileged users.

Mitigation Recommendations

1. Apply vendor-supplied patches immediately once they become available for the affected versions of Gallagher Command Centre Server. 2. Restrict privileged operator access to trusted and trained personnel only, implementing the principle of least privilege. 3. Monitor operator activities and audit logs for unusual or unauthorized attempts to trigger server functions that could lead to crashes. 4. Implement redundancy and failover mechanisms for Command Centre Server deployments to maintain availability during potential service disruptions. 5. Conduct regular security training for operators to raise awareness about the risks of triggering system exceptions. 6. Isolate the Command Centre Server environment to limit local access to authorized personnel and reduce the risk of insider threats. 7. Engage with Gallagher support to obtain timely updates and guidance on vulnerability remediation and best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Gallagher
Date Reserved
2025-06-17T02:18:59.246Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f9a9e6102015466a331000

Added to database: 10/23/2025, 4:07:02 AM

Last enriched: 10/23/2025, 4:09:09 AM

Last updated: 10/23/2025, 8:08:13 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats