CVE-2024-21815

9.1 CRITICAL

📋 TL;DR

Authenticated but unprivileged users can access insufficiently protected credentials for third-party DVR integrations in Gallagher Command Centre. This allows unauthorized access to DVR systems and affects all Gallagher Command Centre versions 8.60 and prior, plus specific vulnerable versions up to 9.00.

💻 Affected Systems

Products:
  • Gallagher Command Centre
Versions: All versions 8.60 and prior; 8.70 prior to vEL8.70.2526 (MR6); 8.80 prior to vEL8.80.1526 (MR4); 8.90 prior to vEL8.90.1751 (MR3); 9.00 prior to vEL9.00.1774 (MR2)
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: Requires third-party DVR integration configured; affects all authenticated users regardless of privilege level.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full control of integrated DVR systems, potentially accessing sensitive video footage, manipulating recordings, or using DVRs as pivot points into other systems.

🟠

Likely Case

Unauthorized users access DVR credentials, leading to surveillance system compromise, privacy violations, and potential physical security bypass.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to credential exposure without direct DVR access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but no special privileges; credential access is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vEL9.00.1774 (MR2) for 9.00; vEL8.90.1751 (MR3) for 8.90; vEL8.80.1526 (MR4) for 8.80; vEL8.70.2526 (MR6) for 8.70; 8.60 requires upgrade to newer version

Vendor Advisory: https://security.gallagher.com/Security-Advisories/CVE-2024-21815

Restart Required: Yes

Instructions:

1. Backup system configuration. 2. Download appropriate patch version from Gallagher support portal. 3. Apply patch following Gallagher upgrade procedures. 4. Restart Command Centre services. 5. Verify patch installation and system functionality.

🔧 Temporary Workarounds

Restrict User Access

all

Limit authenticated user accounts to only necessary personnel and implement least privilege access controls.

Network Segmentation

all

Isolate Command Centre server and DVR systems on separate network segments with strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls and audit all user accounts with Command Centre access.
  • Disconnect or disable third-party DVR integrations until patching is possible.

🔍 How to Verify

Check if Vulnerable:

Check Command Centre version against affected versions list; verify if third-party DVR integrations are configured.

Check Version:

Check version in Command Centre web interface under System Information or via Gallagher diagnostic tools.

Verify Fix Applied:

Confirm version is updated to patched version; test that authenticated unprivileged users cannot access DVR credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to DVR credential storage
  • Multiple failed authentication attempts followed by credential access

Network Indicators:

  • Unusual connections from Command Centre server to DVR systems
  • Traffic patterns suggesting credential harvesting

SIEM Query:

source="command_centre" AND (event_type="credential_access" OR user_privilege="low" AND resource="dvr_credentials")

🔗 References

📤 Share & Export