CVE-2024-23317

6.3 MEDIUM

📋 TL;DR

This vulnerability allows an attacker with local access to Gallagher Controller 6000/7000 systems to control file paths and execute arbitrary code. It affects multiple versions of Gallagher security controllers. Attackers need local access to exploit this weakness.

💻 Affected Systems

Products:
  • Gallagher Controller 6000
  • Gallagher Controller 7000
Versions: 9.10 prior to vCR9.10.240520a, 9.00 prior to vCR9.00.240521a, 8.90 prior to vCR8.90.240520a, 8.80 prior to vCR8.80.240520a, 8.70 prior to vCR8.70.240520a, all versions of 8.60 and prior
Operating Systems: Proprietary controller OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations. Requires local access to controller interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the security controller, potentially affecting physical security systems.

🟠

Likely Case

Attacker with local access executes malicious code to disrupt security operations or pivot to other systems.

🟢

If Mitigated

Limited impact due to network segmentation and strict access controls preventing local attacker access.

🌐 Internet-Facing: LOW - Requires local access to controller, not directly exploitable over internet.
🏢 Internal Only: HIGH - Local attackers on the same network segment can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of controller systems. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vCR9.10.240520a, vCR9.00.240521a, vCR8.90.240520a, vCR8.80.240520a, vCR8.70.240520a

Vendor Advisory: https://security.gallagher.com/Security-Advisories/CVE-2024-23317

Restart Required: Yes

Instructions:

1. Download appropriate patch version from Gallagher support portal. 2. Backup current configuration. 3. Apply patch following Gallagher documentation. 4. Restart controller. 5. Verify patch installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate controller network from general user networks to limit local access.

Access Control Restrictions

all

Implement strict physical and logical access controls to controller interfaces.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate controllers
  • Apply principle of least privilege for all controller access

🔍 How to Verify

Check if Vulnerable:

Check controller version against affected versions list. Access controller web interface or CLI and check firmware version.

Check Version:

Check via controller web interface or Gallagher Command Centre software

Verify Fix Applied:

Verify controller version matches patched versions: vCR9.10.240520a, vCR9.00.240521a, vCR8.90.240520a, vCR8.80.240520a, or vCR8.70.240520a.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file access attempts
  • Unusual process execution on controller
  • Configuration changes from unexpected sources

Network Indicators:

  • Unexpected connections to controller management interfaces
  • Traffic from unauthorized network segments to controllers

SIEM Query:

source="gallagher-controller" AND (event_type="file_access" OR event_type="process_execution") AND user NOT IN ["authorized_users"]

🔗 References

📤 Share & Export