CVE-2021-23167

8.1 HIGH

📋 TL;DR

This vulnerability allows man-in-the-middle attackers to intercept and potentially decrypt sensitive communications between Gallagher Command Centre servers and SMTP clients due to improper certificate validation. It affects Gallagher Command Centre security management software versions 8.50 prior to 8.50.2048, 8.40 prior to 8.40.2063, 8.30 prior to 8.30.1454, and all 8.20 and earlier versions.

💻 Affected Systems

Products:
  • Gallagher Command Centre
Versions: 8.50 versions prior to 8.50.2048 (MR3); 8.40 versions prior to 8.40.2063 (MR4); 8.30 versions prior to 8.30.1454 (MR4); version 8.20 and prior versions
Operating Systems: Windows Server (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects SMTP client functionality within Command Centre when communicating with email servers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could intercept and decrypt all sensitive data transmitted between Command Centre servers and SMTP clients, including credentials, access logs, and security event data.

🟠

Likely Case

Attackers positioned between the Command Centre server and SMTP server could intercept email notifications, system alerts, and potentially gain access to sensitive information.

🟢

If Mitigated

With proper network segmentation and certificate validation, the attack surface is limited to internal network segments where attackers have positioning.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network positioning between Command Centre server and SMTP server, but no authentication needed once positioned.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.50.2048 (MR3), 8.40.2063 (MR4), 8.30.1454 (MR4)

Vendor Advisory: https://security.gallagher.com/Security-Advisories/CVE-2021-23167

Restart Required: Yes

Instructions:

1. Download appropriate patch from Gallagher support portal. 2. Backup Command Centre database and configuration. 3. Apply patch following Gallagher's upgrade procedures. 4. Restart Command Centre services.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Command Centre server from untrusted networks and implement strict firewall rules for SMTP traffic.

Certificate Pinning

all

Configure Command Centre to only accept specific SMTP server certificates if supported.

🧯 If You Can't Patch

  • Implement network monitoring and IDS/IPS to detect certificate validation bypass attempts
  • Use VPN or encrypted tunnels for all SMTP communications between Command Centre and email servers

🔍 How to Verify

Check if Vulnerable:

Check Command Centre version in administration console or via 'Help > About' menu. Compare against affected versions list.

Check Version:

Check via Command Centre GUI: Help > About, or query database for version information.

Verify Fix Applied:

Verify version is 8.50.2048 or higher, 8.40.2063 or higher, or 8.30.1454 or higher. Test SMTP functionality with invalid certificates to ensure proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Failed certificate validation attempts in Command Centre logs
  • Unusual SMTP connection patterns

Network Indicators:

  • Unencrypted or improperly encrypted SMTP traffic from Command Centre server
  • MITM attacks on port 25/587/465

SIEM Query:

source="command-centre-logs" AND (event="certificate_validation_failed" OR event="smtp_connection_error")

🔗 References

📤 Share & Export