CVE-2025-52457: CWE-208 Observable Timing Discrepancy in Gallagher HBUS Devices
Observable Timing Discrepancy (CWE-208) in HBUS devices may allow an attacker with physical access to the device to extract device-specific keys, potentially compromising further site security. This issue affects Command Centre Server: 9.30 prior to vCR9.30.251028a (distributed in 9.30.2881 (MR3)), 9.20 prior to vCR9.20.251028a (distributed in 9.20.3265 (MR5)), 9.10 prior to vCR9.10.251028a (distributed in 9.10.4135 (MR8)), all versions of 9.00 and prior.
AI Analysis
Technical Summary
CVE-2025-52457 identifies a timing side-channel vulnerability (CWE-208) in Gallagher HBUS devices integrated with the Command Centre Server software. The vulnerability arises from observable timing discrepancies during cryptographic operations that allow an attacker with physical access to the device to infer device-specific keys. These keys are critical for securing communications and access control at the site level, meaning their compromise could lead to unauthorized access or manipulation of security systems. The affected software versions include all 9.00 and prior versions, and specific releases of 9.10, 9.20, and 9.30 prior to their respective patched builds (vCR9.xx.251028a). The CVSS 3.1 score is 5.7 (medium), reflecting the requirement for physical access and high attack complexity, but with significant confidentiality and integrity impact. No authentication or user interaction is needed, but the attacker must be physically present at the device. Gallagher has acknowledged the issue and released patches in later maintenance releases (MR3, MR5, MR8) for the affected versions. No public exploits have been reported, but the vulnerability poses a risk to environments where physical security is weak or where attackers could gain temporary device access. The timing discrepancy likely involves subtle differences in processing time during cryptographic key handling, which can be measured and analyzed to recover secret keys. This side-channel attack vector is particularly concerning for security devices that rely on hardware-based keys for site-wide protection.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as government facilities, transportation hubs, energy plants, and large enterprises using Gallagher HBUS devices, this vulnerability could lead to significant security breaches. Extraction of device-specific keys compromises the confidentiality and integrity of access control systems, potentially allowing attackers to bypass physical security controls, manipulate access logs, or disable alarms. This could result in unauthorized physical access, data breaches, or sabotage. The requirement for physical access limits remote exploitation but raises concerns in environments with insufficient physical security or insider threats. The impact is heightened in countries with widespread deployment of Gallagher security solutions in sensitive facilities. Additionally, compromised keys could facilitate lateral movement within a site’s security infrastructure, amplifying the threat. The absence of known exploits suggests limited current risk, but the potential for targeted attacks remains. Organizations may face regulatory and compliance consequences if such breaches occur, particularly under GDPR and other European security regulations.
Mitigation Recommendations
1. Immediately upgrade Gallagher Command Centre Server to the patched versions: 9.30.2881 (MR3), 9.20.3265 (MR5), or 9.10.4135 (MR8) or later, as applicable. 2. Conduct a thorough physical security assessment of all locations housing HBUS devices to prevent unauthorized physical access. 3. Implement tamper-evident seals and intrusion detection mechanisms on devices to detect and deter physical attacks. 4. Regularly audit and monitor device logs and network traffic for anomalies indicating potential key extraction attempts or unauthorized access. 5. Restrict access to devices to trusted personnel only and enforce strict access control policies. 6. Consider deploying additional layers of cryptographic protection or hardware security modules (HSMs) if supported. 7. Train security staff to recognize signs of physical tampering and respond promptly. 8. Maintain an incident response plan that includes procedures for suspected key compromise. 9. Engage with Gallagher support for guidance on secure configuration and future firmware updates. 10. Review and update physical and cybersecurity policies to address side-channel attack vectors.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Norway, Belgium, Italy, Spain, Poland
CVE-2025-52457: CWE-208 Observable Timing Discrepancy in Gallagher HBUS Devices
Description
Observable Timing Discrepancy (CWE-208) in HBUS devices may allow an attacker with physical access to the device to extract device-specific keys, potentially compromising further site security. This issue affects Command Centre Server: 9.30 prior to vCR9.30.251028a (distributed in 9.30.2881 (MR3)), 9.20 prior to vCR9.20.251028a (distributed in 9.20.3265 (MR5)), 9.10 prior to vCR9.10.251028a (distributed in 9.10.4135 (MR8)), all versions of 9.00 and prior.
AI-Powered Analysis
Technical Analysis
CVE-2025-52457 identifies a timing side-channel vulnerability (CWE-208) in Gallagher HBUS devices integrated with the Command Centre Server software. The vulnerability arises from observable timing discrepancies during cryptographic operations that allow an attacker with physical access to the device to infer device-specific keys. These keys are critical for securing communications and access control at the site level, meaning their compromise could lead to unauthorized access or manipulation of security systems. The affected software versions include all 9.00 and prior versions, and specific releases of 9.10, 9.20, and 9.30 prior to their respective patched builds (vCR9.xx.251028a). The CVSS 3.1 score is 5.7 (medium), reflecting the requirement for physical access and high attack complexity, but with significant confidentiality and integrity impact. No authentication or user interaction is needed, but the attacker must be physically present at the device. Gallagher has acknowledged the issue and released patches in later maintenance releases (MR3, MR5, MR8) for the affected versions. No public exploits have been reported, but the vulnerability poses a risk to environments where physical security is weak or where attackers could gain temporary device access. The timing discrepancy likely involves subtle differences in processing time during cryptographic key handling, which can be measured and analyzed to recover secret keys. This side-channel attack vector is particularly concerning for security devices that rely on hardware-based keys for site-wide protection.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as government facilities, transportation hubs, energy plants, and large enterprises using Gallagher HBUS devices, this vulnerability could lead to significant security breaches. Extraction of device-specific keys compromises the confidentiality and integrity of access control systems, potentially allowing attackers to bypass physical security controls, manipulate access logs, or disable alarms. This could result in unauthorized physical access, data breaches, or sabotage. The requirement for physical access limits remote exploitation but raises concerns in environments with insufficient physical security or insider threats. The impact is heightened in countries with widespread deployment of Gallagher security solutions in sensitive facilities. Additionally, compromised keys could facilitate lateral movement within a site’s security infrastructure, amplifying the threat. The absence of known exploits suggests limited current risk, but the potential for targeted attacks remains. Organizations may face regulatory and compliance consequences if such breaches occur, particularly under GDPR and other European security regulations.
Mitigation Recommendations
1. Immediately upgrade Gallagher Command Centre Server to the patched versions: 9.30.2881 (MR3), 9.20.3265 (MR5), or 9.10.4135 (MR8) or later, as applicable. 2. Conduct a thorough physical security assessment of all locations housing HBUS devices to prevent unauthorized physical access. 3. Implement tamper-evident seals and intrusion detection mechanisms on devices to detect and deter physical attacks. 4. Regularly audit and monitor device logs and network traffic for anomalies indicating potential key extraction attempts or unauthorized access. 5. Restrict access to devices to trusted personnel only and enforce strict access control policies. 6. Consider deploying additional layers of cryptographic protection or hardware security modules (HSMs) if supported. 7. Train security staff to recognize signs of physical tampering and respond promptly. 8. Maintain an incident response plan that includes procedures for suspected key compromise. 9. Engage with Gallagher support for guidance on secure configuration and future firmware updates. 10. Review and update physical and cybersecurity policies to address side-channel attack vectors.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gallagher
- Date Reserved
- 2025-06-17T02:18:59.272Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691bed9bd4c3ef3c7a628529
Added to database: 11/18/2025, 3:52:59 AM
Last enriched: 11/25/2025, 4:42:38 AM
Last updated: 1/7/2026, 4:22:22 AM
Views: 93
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.