CVE-2025-64734: CWE-772 Missing Release of Resource after Effective Lifetime in Gallagher T21 Reader
Missing Release of Resource after Effective Lifetime (CWE-772) in the T21 Reader allows an attacker with physical access to the Reader to perform a denial-of-service attack against that specific reader, preventing cardholders from badging for entry. This issue affects Command Centre Server: 9.30 prior to vCR9.30.251028a (distributed in 9.30.2881 (MR3)), 9.20 prior to vCR9.20.251028a (distributed in 9.20.3265 (MR5)), 9.10 prior to vCR9.10.251028a (distributed in 9.10.4135 (MR8)), all versions of 9.00 and prior.
AI Analysis
Technical Summary
CVE-2025-64734 is a vulnerability classified under CWE-772, which refers to the missing release of a resource after its effective lifetime. This flaw exists in the Gallagher T21 Reader, a physical access control device integrated with the Command Centre Server software. The vulnerability arises because the reader fails to properly release certain resources after they are no longer needed, leading to resource exhaustion. An attacker with physical access to the reader can exploit this condition to trigger a denial-of-service (DoS) attack against the affected reader, effectively disabling it and preventing authorized cardholders from gaining entry through that reader. The affected software versions include all versions of Command Centre Server 9.00 and prior, as well as versions 9.10, 9.20, and 9.30 before specific patch releases (vCR9.10.251028a, vCR9.20.251028a, and vCR9.30.251028a). The vulnerability does not impact confidentiality or integrity but affects availability by rendering the reader non-functional. Exploitation requires physical access to the device, no authentication or user interaction is needed, and no known exploits have been reported in the wild. The CVSS v3.1 score of 2.4 reflects the low severity, primarily due to the limited attack vector and impact scope. The issue was published on November 18, 2025, and is currently in a published state with no patch links provided in the source data, indicating that organizations should seek updates directly from Gallagher or their vendors. This vulnerability highlights the importance of proper resource management in embedded systems to prevent DoS conditions.
Potential Impact
For European organizations, the primary impact of CVE-2025-64734 is the potential disruption of physical access control systems relying on Gallagher T21 Readers. A successful attack could deny entry to authorized personnel, causing operational delays, security management challenges, and potential safety risks in sensitive facilities such as government buildings, critical infrastructure sites, and corporate offices. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could hinder business continuity and emergency response capabilities. Organizations with high reliance on Gallagher access control systems may face increased risk of physical security incidents or operational downtime. The requirement for physical access to exploit the vulnerability limits the threat to insiders or attackers with physical proximity, but insider threats or targeted sabotage remain concerns. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation, especially in high-security environments.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Immediately verify the version of Gallagher Command Centre Server and T21 Reader firmware in use and prioritize upgrading to the patched versions vCR9.10.251028a, vCR9.20.251028a, or vCR9.30.251028a as applicable. 2) Restrict physical access to T21 Readers by enhancing perimeter security controls, including surveillance, access restrictions, and tamper-evident seals to prevent unauthorized physical manipulation. 3) Conduct regular physical inspections of readers to detect signs of tampering or malfunction. 4) Implement monitoring and alerting mechanisms within the access control management system to quickly identify and respond to reader outages or failures. 5) Train security personnel to recognize and respond to potential physical sabotage attempts. 6) Coordinate with Gallagher support or authorized vendors to obtain official patches and firmware updates promptly. 7) Consider deploying redundant or failover access control readers in critical entry points to maintain availability in case of device failure. These measures go beyond generic advice by focusing on physical security hardening, operational monitoring, and patch management tailored to this specific vulnerability.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Switzerland, Norway
CVE-2025-64734: CWE-772 Missing Release of Resource after Effective Lifetime in Gallagher T21 Reader
Description
Missing Release of Resource after Effective Lifetime (CWE-772) in the T21 Reader allows an attacker with physical access to the Reader to perform a denial-of-service attack against that specific reader, preventing cardholders from badging for entry. This issue affects Command Centre Server: 9.30 prior to vCR9.30.251028a (distributed in 9.30.2881 (MR3)), 9.20 prior to vCR9.20.251028a (distributed in 9.20.3265 (MR5)), 9.10 prior to vCR9.10.251028a (distributed in 9.10.4135 (MR8)), all versions of 9.00 and prior.
AI-Powered Analysis
Technical Analysis
CVE-2025-64734 is a vulnerability classified under CWE-772, which refers to the missing release of a resource after its effective lifetime. This flaw exists in the Gallagher T21 Reader, a physical access control device integrated with the Command Centre Server software. The vulnerability arises because the reader fails to properly release certain resources after they are no longer needed, leading to resource exhaustion. An attacker with physical access to the reader can exploit this condition to trigger a denial-of-service (DoS) attack against the affected reader, effectively disabling it and preventing authorized cardholders from gaining entry through that reader. The affected software versions include all versions of Command Centre Server 9.00 and prior, as well as versions 9.10, 9.20, and 9.30 before specific patch releases (vCR9.10.251028a, vCR9.20.251028a, and vCR9.30.251028a). The vulnerability does not impact confidentiality or integrity but affects availability by rendering the reader non-functional. Exploitation requires physical access to the device, no authentication or user interaction is needed, and no known exploits have been reported in the wild. The CVSS v3.1 score of 2.4 reflects the low severity, primarily due to the limited attack vector and impact scope. The issue was published on November 18, 2025, and is currently in a published state with no patch links provided in the source data, indicating that organizations should seek updates directly from Gallagher or their vendors. This vulnerability highlights the importance of proper resource management in embedded systems to prevent DoS conditions.
Potential Impact
For European organizations, the primary impact of CVE-2025-64734 is the potential disruption of physical access control systems relying on Gallagher T21 Readers. A successful attack could deny entry to authorized personnel, causing operational delays, security management challenges, and potential safety risks in sensitive facilities such as government buildings, critical infrastructure sites, and corporate offices. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could hinder business continuity and emergency response capabilities. Organizations with high reliance on Gallagher access control systems may face increased risk of physical security incidents or operational downtime. The requirement for physical access to exploit the vulnerability limits the threat to insiders or attackers with physical proximity, but insider threats or targeted sabotage remain concerns. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation, especially in high-security environments.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Immediately verify the version of Gallagher Command Centre Server and T21 Reader firmware in use and prioritize upgrading to the patched versions vCR9.10.251028a, vCR9.20.251028a, or vCR9.30.251028a as applicable. 2) Restrict physical access to T21 Readers by enhancing perimeter security controls, including surveillance, access restrictions, and tamper-evident seals to prevent unauthorized physical manipulation. 3) Conduct regular physical inspections of readers to detect signs of tampering or malfunction. 4) Implement monitoring and alerting mechanisms within the access control management system to quickly identify and respond to reader outages or failures. 5) Train security personnel to recognize and respond to potential physical sabotage attempts. 6) Coordinate with Gallagher support or authorized vendors to obtain official patches and firmware updates promptly. 7) Consider deploying redundant or failover access control readers in critical entry points to maintain availability in case of device failure. These measures go beyond generic advice by focusing on physical security hardening, operational monitoring, and patch management tailored to this specific vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Gallagher
- Date Reserved
- 2025-11-11T04:00:46.427Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691bed9bd4c3ef3c7a628533
Added to database: 11/18/2025, 3:52:59 AM
Last enriched: 11/25/2025, 4:43:10 AM
Last updated: 1/7/2026, 4:20:54 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.