Security Advisories
Identifying vulnerabilities
Gallagher is committed to ensuring that we provide safe, secure and robust products to our customers. As technology changes and evolves, both our internal and third party penetration testers are constantly testing our products to find vulnerabilities.
View Security Advisories Flyer
Maintenance release
Vulnerabilities identified as critical are resolved promptly in all affected, supported versions* of Command Centre and a new version of Command Centre (a maintenance release) will be developed to address the vulnerability. Maintenance releases for a specific version of Command Centre are available to all licensed customers regardless of the customers Software Maintenance status with Gallagher.
Security Advisory
Security Advisories will be available on our website and will contain details of:
- The severity (based on CVSS score system v3.1)
- CVE identification number
- Components affected (e.g. servers, workstations, controllers)
- Versions of software that are affected
- Any mitigations
- Who the vulnerability was reported by
- Whether we are aware of it being actively exploited
- A description of the vulnerability
- Which versions maintenance releases are available for
*supported versions include the current version and the three previous versions of Command Centre
Hardening Guides
Want to ensure your system is configured to mitigate security threats? Request a copy of our hardening guides. These are available for Command Centre, Controller 6000 & Visitor Management Kiosk. These include information on best practice operating system configuration, card technologies and the impacts of legacy hardware.
Current Security Advisories
Click here to read an overview of how we manage the disclosure and prioritization of vulnerabilities and our involvement with the CVE program.
- CVE-2024-42407 | High | 12 December 2024
- CVE-2024-41146 | Medium | 12 December 2024
- CVE-2024-43690 | High | 11 September
- CVE-2024-39808 | Medium | 11 September 2024
- CVE-2024-24972 | Medium | 11 September 2024
- CVE-2024-23906 | Medium | 11 September 2024
- CVE-2024-22387 | Medium | 11 July 2024
- CVE-2024-23194 | Low | 11 July 2024
- CVE-2024-23317 | Medium | 11 July 2024
- CVE-2024-23485 | Medium | 11 July 2024
- C6000 UDP Ports | 18 March 2024
- CVE-2024-22383 | Medium | 5 March 2024
- CVE-2024-21838 | Medium | 5 March 2024
- CVE-2024-21815 | Critical | 5 March 2024
- Diagnostics Service Install | 19 December 2023
- CVE-2023-23576 | Medium | 19 December 2023
- CVE-2023-24590 | High | 19 December 2023
- CVE-2023-23570 | Medium | 19 December 2023
- CVE-2023-22439 | Low | 19 December 2023
- CVE-2023-23584 | Medium | 19 December 2023
- CVE-2023-41967 | Low | 19 December 2023
- CVE-2023-46686 | Medium | 19 December 2023
- CVE-2023-6355 | Medium | 19 December 2023
- CVE-2023-22363 | Medium | 25 July 2023
- CVE-2023-23568 | Medium | 25 July 2023
- CVE-2023-25074 | High | 25 July 2023
- CVE-2023-22428 | High | 25 July 2023
- CVE-2023-24584 | High | 31 May 2023
- Bluetooth Relay Attack | 25 June 2022
- OpenSSL Infinite Loop | High | 15th June 2022
- CVE-2022-26348 | High | 15th June 2022
- CVE-2022-26078 | High | 15th June 2022
- Apache Java Log4j | Unaffected | 15th Dec 2021
- CVE-2021-23197 | Medium | 15th Nov 2021
- CVE-2021-23193 | High | 15th Nov 2021
- CVE-2021-23167 | High | 15th Nov 2021
- CVE-2021-23162 | High | 15th Nov 2021
- CVE-2021-23155 | Critical | 15th Nov 2021
- CVE-2021-23146 | Medium | 15th Nov 2021
- CVE Archive
Security Researcher Acknowledgements
Gallagher strongly values the efforts of security researchers, and would like to personally acknowledge the following individuals who have helped to strengthen Gallagher’s products and services through the responsible disclosure of security vulnerabilities.
Sharan K
Stay up to date with Gallagher
Get the latest Gallagher news, updates, and event information delivered straight to your inbox.