Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52457: CWE-208 Observable Timing Discrepancy in Gallagher HBUS Devices

0
Medium
VulnerabilityCVE-2025-52457cvecve-2025-52457cwe-208
Published: Tue Nov 18 2025 (11/18/2025, 03:25:57 UTC)
Source: CVE Database V5
Vendor/Project: Gallagher
Product: HBUS Devices

Description

Observable Timing Discrepancy (CWE-208) in HBUS devices may allow an attacker with physical access to the device to extract device-specific keys, potentially compromising further site security. This issue affects Command Centre Server: 9.30 prior to vCR9.30.251028a (distributed in 9.30.2881 (MR3)), 9.20 prior to vCR9.20.251028a (distributed in 9.20.3265 (MR5)), 9.10 prior to vCR9.10.251028a (distributed in 9.10.4135 (MR8)), all versions of 9.00 and prior.

AI-Powered Analysis

AILast updated: 11/25/2025, 04:42:38 UTC

Technical Analysis

CVE-2025-52457 identifies a timing side-channel vulnerability (CWE-208) in Gallagher HBUS devices integrated with the Command Centre Server software. The vulnerability arises from observable timing discrepancies during cryptographic operations that allow an attacker with physical access to the device to infer device-specific keys. These keys are critical for securing communications and access control at the site level, meaning their compromise could lead to unauthorized access or manipulation of security systems. The affected software versions include all 9.00 and prior versions, and specific releases of 9.10, 9.20, and 9.30 prior to their respective patched builds (vCR9.xx.251028a). The CVSS 3.1 score is 5.7 (medium), reflecting the requirement for physical access and high attack complexity, but with significant confidentiality and integrity impact. No authentication or user interaction is needed, but the attacker must be physically present at the device. Gallagher has acknowledged the issue and released patches in later maintenance releases (MR3, MR5, MR8) for the affected versions. No public exploits have been reported, but the vulnerability poses a risk to environments where physical security is weak or where attackers could gain temporary device access. The timing discrepancy likely involves subtle differences in processing time during cryptographic key handling, which can be measured and analyzed to recover secret keys. This side-channel attack vector is particularly concerning for security devices that rely on hardware-based keys for site-wide protection.

Potential Impact

For European organizations, especially those in critical infrastructure sectors such as government facilities, transportation hubs, energy plants, and large enterprises using Gallagher HBUS devices, this vulnerability could lead to significant security breaches. Extraction of device-specific keys compromises the confidentiality and integrity of access control systems, potentially allowing attackers to bypass physical security controls, manipulate access logs, or disable alarms. This could result in unauthorized physical access, data breaches, or sabotage. The requirement for physical access limits remote exploitation but raises concerns in environments with insufficient physical security or insider threats. The impact is heightened in countries with widespread deployment of Gallagher security solutions in sensitive facilities. Additionally, compromised keys could facilitate lateral movement within a site’s security infrastructure, amplifying the threat. The absence of known exploits suggests limited current risk, but the potential for targeted attacks remains. Organizations may face regulatory and compliance consequences if such breaches occur, particularly under GDPR and other European security regulations.

Mitigation Recommendations

1. Immediately upgrade Gallagher Command Centre Server to the patched versions: 9.30.2881 (MR3), 9.20.3265 (MR5), or 9.10.4135 (MR8) or later, as applicable. 2. Conduct a thorough physical security assessment of all locations housing HBUS devices to prevent unauthorized physical access. 3. Implement tamper-evident seals and intrusion detection mechanisms on devices to detect and deter physical attacks. 4. Regularly audit and monitor device logs and network traffic for anomalies indicating potential key extraction attempts or unauthorized access. 5. Restrict access to devices to trusted personnel only and enforce strict access control policies. 6. Consider deploying additional layers of cryptographic protection or hardware security modules (HSMs) if supported. 7. Train security staff to recognize signs of physical tampering and respond promptly. 8. Maintain an incident response plan that includes procedures for suspected key compromise. 9. Engage with Gallagher support for guidance on secure configuration and future firmware updates. 10. Review and update physical and cybersecurity policies to address side-channel attack vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Gallagher
Date Reserved
2025-06-17T02:18:59.272Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691bed9bd4c3ef3c7a628529

Added to database: 11/18/2025, 3:52:59 AM

Last enriched: 11/25/2025, 4:42:38 AM

Last updated: 1/7/2026, 4:52:24 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats