CVE-2023-24590

7.5 HIGH

📋 TL;DR

A format string vulnerability in Gallagher Controller 6000's diagnostic web interface allows attackers to read/write memory and potentially crash the device, causing denial of service. This affects Gallagher Controller 6000 versions 8.50 and earlier, and version 8.60 before vCR8.60.231116a.

💻 Affected Systems

Products:
  • Gallagher Controller 6000
Versions: All versions of 8.50 and prior, 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7))
Operating Systems: Embedded system
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the optional diagnostic web interface to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data exfiltration, or permanent device damage requiring hardware replacement.

🟠

Likely Case

Denial of service through device crash, potentially disrupting physical access control systems and security operations.

🟢

If Mitigated

Limited information disclosure or minor service disruption if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Format string vulnerabilities typically require some reverse engineering but are well-understood attack vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vCR8.60.231116a (distributed in 8.60.2550 (MR7))

Vendor Advisory: https://security.gallagher.com/Security-Advisories/CVE-2023-24590

Restart Required: Yes

Instructions:

1. Download the firmware update from Gallagher support portal. 2. Backup current configuration. 3. Apply firmware update following Gallagher's upgrade procedures. 4. Restart the controller. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable Diagnostic Interface

all

Disable the optional diagnostic web interface if not required for operations.

Configuration varies by version - consult Gallagher documentation for disabling diagnostic interface

Network Segmentation

linux

Restrict network access to the diagnostic interface using firewall rules.

iptables -A INPUT -p tcp --dport [diagnostic_port] -s [trusted_networks] -j ACCEPT
iptables -A INPUT -p tcp --dport [diagnostic_port] -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted management networks only.
  • Monitor for unusual access attempts to the diagnostic interface and implement intrusion detection rules.

🔍 How to Verify

Check if Vulnerable:

Check controller firmware version via Gallagher Command Centre or web interface. If version is 8.50 or earlier, or 8.60 without vCR8.60.231116a patch, system is vulnerable.

Check Version:

Check via Gallagher Command Centre interface or web admin panel - specific commands vary by deployment.

Verify Fix Applied:

Verify firmware version shows vCR8.60.231116a or later in 8.60 series, or confirm diagnostic interface is disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to diagnostic web interface
  • Controller crash/restart events in system logs
  • Format string patterns in web request logs

Network Indicators:

  • Unexpected traffic to diagnostic interface ports
  • Malformed HTTP requests containing format string specifiers

SIEM Query:

source="controller_logs" AND (event="crash" OR event="restart") OR (http_request CONTAINS "%n" OR http_request CONTAINS "%s" OR http_request CONTAINS "%x")

🔗 References

📤 Share & Export