Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64734: CWE-772 Missing Release of Resource after Effective Lifetime in Gallagher T21 Reader

0
Low
VulnerabilityCVE-2025-64734cvecve-2025-64734cwe-772
Published: Tue Nov 18 2025 (11/18/2025, 03:26:44 UTC)
Source: CVE Database V5
Vendor/Project: Gallagher
Product: T21 Reader

Description

Missing Release of Resource after Effective Lifetime (CWE-772) in the T21 Reader allows an attacker with physical access to the Reader to perform a denial-of-service attack against that specific reader, preventing cardholders from badging for entry. This issue affects Command Centre Server: 9.30 prior to vCR9.30.251028a (distributed in 9.30.2881 (MR3)), 9.20 prior to vCR9.20.251028a (distributed in 9.20.3265 (MR5)), 9.10 prior to vCR9.10.251028a (distributed in 9.10.4135 (MR8)),  all versions of 9.00 and prior.

AI-Powered Analysis

AILast updated: 11/18/2025, 04:00:43 UTC

Technical Analysis

CVE-2025-64734 identifies a vulnerability classified under CWE-772 (Missing Release of Resource after Effective Lifetime) in Gallagher's T21 Reader, a physical access control device integrated with the Command Centre Server software. The flaw arises because the reader fails to properly release resources after their effective lifetime, leading to resource exhaustion. This condition can be triggered by an attacker with physical access to the reader, causing it to enter a denial-of-service state where it no longer processes badge entries. The affected software versions include all versions of Command Centre Server 9.00 and prior, as well as specific builds of versions 9.10, 9.20, and 9.30 before their respective patch releases. The vulnerability does not require authentication or user interaction beyond physical access, and it does not compromise confidentiality or integrity of data, only availability. The CVSS v3.1 base score is 2.4, reflecting low severity due to the limited attack vector (physical access) and impact scope (single reader device). No public exploit code or active exploitation has been reported. The issue highlights the importance of resource management in embedded systems controlling physical security infrastructure. Organizations relying on Gallagher T21 Readers should monitor for vendor patches and apply updates promptly to prevent potential denial-of-service disruptions at access points.

Potential Impact

For European organizations, the primary impact of CVE-2025-64734 is the potential denial-of-service of Gallagher T21 Readers, which could disrupt physical access control systems. This may lead to temporary inability for authorized personnel to badge into secure areas, causing operational delays and potential security risks if manual override procedures are not in place. While the vulnerability does not expose sensitive data or allow unauthorized access, the availability loss could affect critical infrastructure facilities, corporate offices, or government buildings relying on these readers. The requirement for physical access to exploit the vulnerability limits the threat to insider attackers or adversaries with physical proximity. However, in high-security environments where Gallagher products are widely deployed, such disruptions could have cascading effects on security operations and business continuity. The absence of known exploits reduces immediate risk, but organizations should remain vigilant given the potential for targeted physical attacks.

Mitigation Recommendations

1. Apply vendor patches and updates to Command Centre Server as soon as they become available, specifically versions vCR9.30.251028a, vCR9.20.251028a, and vCR9.10.251028a or later. 2. Enhance physical security controls around T21 Readers to prevent unauthorized physical access, including surveillance, tamper detection, and restricted access zones. 3. Implement monitoring and alerting for reader malfunctions or denial-of-service conditions to enable rapid response. 4. Develop and rehearse manual access procedures or alternative authentication methods to maintain operations during reader outages. 5. Conduct regular audits of physical access control devices to identify and remediate resource management issues proactively. 6. Coordinate with Gallagher support for guidance and to confirm patch applicability in complex environments. 7. Limit physical access to readers to trusted personnel only, reducing the risk of exploitation. 8. Document incident response plans specifically addressing physical access control device failures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Gallagher
Date Reserved
2025-11-11T04:00:46.427Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691bed9bd4c3ef3c7a628533

Added to database: 11/18/2025, 3:52:59 AM

Last enriched: 11/18/2025, 4:00:43 AM

Last updated: 11/18/2025, 6:13:48 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats