CVE-2020-16098

9.8 CRITICAL

📋 TL;DR

CVE-2020-16098 allows unauthenticated attackers to enumerate access card credentials from Gallagher Command Centre security systems via network connections. These credentials can then be used to create unauthorized access cards for systems supporting insecure card technologies. Affected organizations include those using vulnerable versions of Gallagher Command Centre for physical access control.

💻 Affected Systems

Products:
  • Gallagher Command Centre
Versions: v8.20 prior to v8.20.1166(MR3), v8.10 prior to v8.10.1211(MR5), v8.00 prior to v8.00.1228(MR6), all versions of 7.90 and earlier
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using insecure card technologies (like low-security cards). Systems using high-security cards or biometrics are not directly vulnerable to credential misuse.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain physical access to secured facilities by creating cloned access cards, potentially compromising sensitive areas, assets, or personnel safety.

🟠

Likely Case

Unauthorized individuals create access cards to enter restricted areas, leading to theft, espionage, or safety violations.

🟢

If Mitigated

With proper network segmentation and monitoring, unauthorized access attempts are detected before successful exploitation.

🌐 Internet-Facing: HIGH - If Command Centre servers are exposed to the internet, attackers can remotely enumerate credentials without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability to gain unauthorized physical access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the Command Centre server but no authentication, making it relatively simple for attackers with network connectivity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v8.20.1166(MR3), v8.10.1211(MR5), v8.00.1228(MR6)

Vendor Advisory: https://security.gallagher.com/Security-Advisories/CVE-2020-16098

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Gallagher support. 2. Backup the Command Centre database. 3. Apply the patch following Gallagher's installation guide. 4. Restart the Command Centre server. 5. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Command Centre servers to only authorized management systems and clients.

Use firewall rules to block unauthorized IPs: iptables -A INPUT -s <authorized_ips> -p tcp --dport <command_centre_port> -j ACCEPT
iptables -A INPUT -p tcp --dport <command_centre_port> -j DROP

Disable Insecure Card Technologies

windows

Disable support for low-security card technologies in Command Centre configuration.

Navigate to Command Centre Configuration > Card Technologies
Disable any insecure card formats (e.g., low-security magnetic stripe, basic proximity)

🧯 If You Can't Patch

  • Isolate Command Centre servers on a dedicated VLAN with strict access controls.
  • Implement continuous monitoring for unusual network connections to Command Centre servers.

🔍 How to Verify

Check if Vulnerable:

Check Command Centre version in the administration interface. If version matches affected ranges, the system is vulnerable.

Check Version:

In Command Centre GUI: Help > About, or check server logs for version information.

Verify Fix Applied:

Verify the version is updated to a patched version (v8.20.1166(MR3) or later for v8.20, etc.) in the administration interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to Command Centre server from unauthorized IPs
  • Multiple failed authentication attempts followed by successful enumeration

Network Indicators:

  • Unexpected traffic to Command Centre server ports from external or unauthorized internal IPs
  • Patterns of data extraction without corresponding user logins

SIEM Query:

source="command_centre_logs" AND (event="unauthorized_connection" OR src_ip NOT IN authorized_ips) AND dest_port=<command_centre_port>

🔗 References

📤 Share & Export