CVE-2021-23204

8.1 HIGH

📋 TL;DR

This vulnerability exposes OSDP key material to unauthorized Command Centre Operators in Gallagher Command Centre Server, potentially allowing them to access sensitive security system data. It affects Gallagher Command Centre versions 8.40 prior to 8.40.1888 (MR3) and 8.30 prior to 8.30.1359 (MR3).

💻 Affected Systems

Products:
  • Gallagher Command Centre Server
Versions: 8.40 versions prior to 8.40.1888 (MR3); 8.30 versions prior to 8.30.1359 (MR3)
Operating Systems: Windows Server (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Command Centre Server installations with OSDP-enabled controllers. Requires operator access to the Command Centre interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized operators could obtain cryptographic keys used for OSDP communication, potentially enabling them to intercept, manipulate, or disrupt physical access control communications between controllers and readers.

🟠

Likely Case

Authorized operators with elevated privileges could access sensitive key material they shouldn't have access to, potentially compromising the integrity of physical access control systems.

🟢

If Mitigated

With proper access controls and monitoring, exposure would be limited to authorized personnel only, though still violating principle of least privilege.

🌐 Internet-Facing: LOW - This appears to be an internal system vulnerability requiring operator access to the Command Centre interface.
🏢 Internal Only: HIGH - Internal operators with access to the Command Centre interface could exploit this vulnerability to access sensitive cryptographic material.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the Command Centre operator interface. The vulnerability appears to be an information exposure through the normal interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.40.1888 (MR3) for 8.40 branch; 8.30.1359 (MR3) for 8.30 branch

Vendor Advisory: https://security.gallagher.com/Security-Advisories/CVE-2021-23204

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Gallagher support portal. 2. Backup Command Centre configuration. 3. Apply the patch following Gallagher's installation instructions. 4. Restart the Command Centre Server service. 5. Verify the patch was applied successfully.

🔧 Temporary Workarounds

Restrict Operator Access

all

Limit access to Command Centre interface to only essential personnel and implement principle of least privilege for operator roles.

Network Segmentation

all

Isolate Command Centre Server from general network access and restrict connections to authorized management stations only.

🧯 If You Can't Patch

  • Implement strict access controls and audit logging for all Command Centre operator activities
  • Monitor for unusual access patterns to OSDP configuration sections and review operator privilege assignments

🔍 How to Verify

Check if Vulnerable:

Check Command Centre version in Help > About. If version is 8.40.x where x < 1888, or 8.30.x where x < 1359, the system is vulnerable.

Check Version:

Check via Command Centre GUI: Help > About, or check Windows registry at HKEY_LOCAL_MACHINE\SOFTWARE\Gallagher\Command Centre\Version

Verify Fix Applied:

Verify version shows 8.40.1888 or higher for 8.40 branch, or 8.30.1359 or higher for 8.30 branch. Test that OSDP key material is no longer visible to unauthorized operators.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to OSDP configuration sections
  • Multiple failed authentication attempts followed by successful login
  • Operator account accessing sensitive configuration areas

Network Indicators:

  • Unusual network traffic patterns to/from Command Centre Server
  • Access from unauthorized IP addresses

SIEM Query:

source="command-centre-logs" AND (event_type="config_access" AND config_section="osdp" OR event_type="auth_success" FROM new_ip)

🔗 References

📤 Share & Export