Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64734: CWE-772 Missing Release of Resource after Effective Lifetime in Gallagher T21 Reader

0
Low
VulnerabilityCVE-2025-64734cvecve-2025-64734cwe-772
Published: Tue Nov 18 2025 (11/18/2025, 03:26:44 UTC)
Source: CVE Database V5
Vendor/Project: Gallagher
Product: T21 Reader

Description

Missing Release of Resource after Effective Lifetime (CWE-772) in the T21 Reader allows an attacker with physical access to the Reader to perform a denial-of-service attack against that specific reader, preventing cardholders from badging for entry. This issue affects Command Centre Server: 9.30 prior to vCR9.30.251028a (distributed in 9.30.2881 (MR3)), 9.20 prior to vCR9.20.251028a (distributed in 9.20.3265 (MR5)), 9.10 prior to vCR9.10.251028a (distributed in 9.10.4135 (MR8)),  all versions of 9.00 and prior.

AI-Powered Analysis

AILast updated: 11/25/2025, 04:43:10 UTC

Technical Analysis

CVE-2025-64734 is a vulnerability classified under CWE-772, which refers to the missing release of a resource after its effective lifetime. This flaw exists in the Gallagher T21 Reader, a physical access control device integrated with the Command Centre Server software. The vulnerability arises because the reader fails to properly release certain resources after they are no longer needed, leading to resource exhaustion. An attacker with physical access to the reader can exploit this condition to trigger a denial-of-service (DoS) attack against the affected reader, effectively disabling it and preventing authorized cardholders from gaining entry through that reader. The affected software versions include all versions of Command Centre Server 9.00 and prior, as well as versions 9.10, 9.20, and 9.30 before specific patch releases (vCR9.10.251028a, vCR9.20.251028a, and vCR9.30.251028a). The vulnerability does not impact confidentiality or integrity but affects availability by rendering the reader non-functional. Exploitation requires physical access to the device, no authentication or user interaction is needed, and no known exploits have been reported in the wild. The CVSS v3.1 score of 2.4 reflects the low severity, primarily due to the limited attack vector and impact scope. The issue was published on November 18, 2025, and is currently in a published state with no patch links provided in the source data, indicating that organizations should seek updates directly from Gallagher or their vendors. This vulnerability highlights the importance of proper resource management in embedded systems to prevent DoS conditions.

Potential Impact

For European organizations, the primary impact of CVE-2025-64734 is the potential disruption of physical access control systems relying on Gallagher T21 Readers. A successful attack could deny entry to authorized personnel, causing operational delays, security management challenges, and potential safety risks in sensitive facilities such as government buildings, critical infrastructure sites, and corporate offices. Although the vulnerability does not compromise data confidentiality or integrity, the availability impact could hinder business continuity and emergency response capabilities. Organizations with high reliance on Gallagher access control systems may face increased risk of physical security incidents or operational downtime. The requirement for physical access to exploit the vulnerability limits the threat to insiders or attackers with physical proximity, but insider threats or targeted sabotage remain concerns. The absence of known exploits reduces immediate risk but does not eliminate the need for proactive mitigation, especially in high-security environments.

Mitigation Recommendations

European organizations should implement the following specific mitigation strategies: 1) Immediately verify the version of Gallagher Command Centre Server and T21 Reader firmware in use and prioritize upgrading to the patched versions vCR9.10.251028a, vCR9.20.251028a, or vCR9.30.251028a as applicable. 2) Restrict physical access to T21 Readers by enhancing perimeter security controls, including surveillance, access restrictions, and tamper-evident seals to prevent unauthorized physical manipulation. 3) Conduct regular physical inspections of readers to detect signs of tampering or malfunction. 4) Implement monitoring and alerting mechanisms within the access control management system to quickly identify and respond to reader outages or failures. 5) Train security personnel to recognize and respond to potential physical sabotage attempts. 6) Coordinate with Gallagher support or authorized vendors to obtain official patches and firmware updates promptly. 7) Consider deploying redundant or failover access control readers in critical entry points to maintain availability in case of device failure. These measures go beyond generic advice by focusing on physical security hardening, operational monitoring, and patch management tailored to this specific vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Gallagher
Date Reserved
2025-11-11T04:00:46.427Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691bed9bd4c3ef3c7a628533

Added to database: 11/18/2025, 3:52:59 AM

Last enriched: 11/25/2025, 4:43:10 AM

Last updated: 1/7/2026, 4:20:54 AM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats