Severity: Critical (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Components affected: Gallagher Command Centre Server
Versions of Command Centre affected: Versions of 8.30 prior to v8.30.1236 MR1 when the legacy 'Smart Card Login' feature is in use or if any workstations are not using client authentication. Versions of v8.20 prior to v8.20.1166(MR3), versions of v8.10 prior to v8.10.1211(MR5), versions of 8.00 prior to v8.00.1228(MR6), all versions of v7.90 and earlier.
Reported by: Gallagher
Active exploitation of vulnerability*: No
Description of vulnerability: It is possible to enumerate access card credentials via an unauthenticated network connection to the server in versions of Command Centre v8.20 prior to v8.20.1166(MR3), versions of 8.10 prior to v8.101211(MR5), versions of 8.00 prior to v8.00.1228(MR6), all versions of 7.90 and earlier. These credentials can then be used to encode low security cards to be used by the system where insecure card technologies are supported.
Mitigation: Ensuring that 'Smart Card Login' is disabled on all workstations reduces the severity to High (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N). Ensuring your readers only accept secure card technologies as well as having Smart Card Login disabled would reduce the severity to Medium (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). A network route between the attacker and the server is required for this attack. In v8.30 ensuring all workstations are using client authentication and have 'Smart Card Login' disabled (it is disabled by default) completely mitigates this vulnerability.
Maintenance releases are now available for:
v8.30 - v8.30.1236(MR1)
v8.20 - v8.20.1166(MR3)
v8.10 - v8.10.1211(MR5)
v8.00 - v8.00.1228(MR6)
- These maintenance upgrades require the Command Centre server to be upgraded.
- These MRs remove the logon via card functionality for the Configuration Client.
*This indicates whether Gallagher are aware of this being actively exploited against customer sites.