CVE-2022-26348

8.2 HIGH

📋 TL;DR

This SQL injection vulnerability in Gallagher Command Centre Server allows attackers to execute arbitrary SQL queries via Windows Registry settings for date fields. Attackers can exploit this through the Visitor Management Kiosk application to extract sensitive information from the database. Affected systems include Gallagher Command Centre versions 8.60 prior to 8.60.1652, 8.50 prior to 8.50.2245, 8.40 prior to 8.40.2216, 8.30 prior to 8.30.1470, and all 8.20 and earlier versions.

💻 Affected Systems

Products:
  • Gallagher Command Centre Server
Versions: 8.60 prior to 8.60.1652, 8.50 prior to 8.50.2245, 8.40 prior to 8.40.2216, 8.30 prior to 8.30.1470, 8.20 and all earlier versions
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows Registry access and exploitation through Visitor Management Kiosk application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including extraction of sensitive credentials, access control data, and system configuration, potentially leading to full system takeover.

🟠

Likely Case

Unauthorized data extraction from the Command Centre database, including visitor logs, user information, and system configuration data.

🟢

If Mitigated

Limited or no data exposure if proper input validation and registry access controls are implemented.

🌐 Internet-Facing: MEDIUM - Requires access to Visitor Management Kiosk which may be internet-facing in some deployments.
🏢 Internal Only: HIGH - Internal attackers with access to kiosk applications can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires access to Visitor Management Kiosk and ability to modify Windows Registry settings. SQL injection occurs via date field parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.60.1652, 8.50.2245, 8.40.2216, 8.30.1470

Vendor Advisory: https://security.gallagher.com/Security-Advisories/CVE-2022-26348

Restart Required: Yes

Instructions:

1. Download appropriate patch version from Gallagher support portal. 2. Backup system and database. 3. Install patch following Gallagher documentation. 4. Restart Command Centre services. 5. Verify installation and functionality.

🔧 Temporary Workarounds

Restrict Registry Access

windows

Limit Windows Registry permissions to prevent unauthorized modifications to Command Centre settings.

regedit -> Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Gallagher\Command Centre -> Right-click -> Permissions -> Restrict access to authorized administrators only

Network Segmentation

all

Isolate Visitor Management Kiosk systems from Command Centre servers using network segmentation.

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries for all database interactions
  • Deploy web application firewall (WAF) with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check Command Centre version via Control Panel -> Programs and Features or using 'gallagher version' command if available.

Check Version:

Check Windows Registry at HKEY_LOCAL_MACHINE\SOFTWARE\Gallagher\Command Centre for version information or use system documentation.

Verify Fix Applied:

Verify installed version matches or exceeds patched versions: 8.60.1652, 8.50.2245, 8.40.2216, or 8.30.1470.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts from kiosk systems
  • Registry modification events for Gallagher keys

Network Indicators:

  • Unusual database connection patterns from kiosk systems
  • Large data transfers from Command Centre database

SIEM Query:

source="database_logs" AND (query="*SELECT*FROM*" OR query="*UNION*SELECT*") AND src_ip="kiosk_network"

🔗 References

📤 Share & Export