CVE-2024-24972

6.5 MEDIUM

📋 TL;DR

A buffer overflow vulnerability (CWE-120) in Gallagher Controller 6000/7000 diagnostic web interface allows authenticated operators to reboot controllers, causing denial of service. This affects multiple firmware versions of Controller 6000 and 7000 systems. The diagnostic interface is disabled by default but becomes vulnerable when enabled.

💻 Affected Systems

Products:
  • Gallagher Controller 6000
  • Gallagher Controller 7000
Versions: 9.10 prior to vCR9.10.240816a, 9.00 prior to vCR9.00.240816a, 8.90 prior to vCR8.90.240816a, 8.80 prior to vCR8.80.240816b, all versions of 8.70 and prior
Operating Systems: Embedded firmware
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when diagnostic web interface is enabled (default is disabled). Interface intended for diagnostic purposes only.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker exploits buffer overflow to reboot critical access control controllers, disrupting physical security operations and potentially causing extended downtime.

🟠

Likely Case

Authorized operator accidentally or intentionally triggers reboot through diagnostic interface, causing temporary service disruption until controller restarts.

🟢

If Mitigated

With diagnostic interface disabled (default), no exploitation possible; systems operate normally with full functionality.

🌐 Internet-Facing: LOW - Diagnostic interface should not be internet-facing per vendor guidance; if exposed, risk increases to MEDIUM.
🏢 Internal Only: MEDIUM - Requires authenticated access but could be exploited by malicious insiders or compromised accounts within network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated operator access to diagnostic interface. Buffer overflow leads to reboot rather than code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vCR9.10.240816a, vCR9.00.240816a, vCR8.90.240816a, vCR8.80.240816b

Vendor Advisory: https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2024-24972

Restart Required: Yes

Instructions:

1. Download appropriate firmware update from Gallagher support portal. 2. Backup controller configuration. 3. Apply firmware update following Gallagher documentation. 4. Verify update completed successfully. 5. Test system functionality.

🔧 Temporary Workarounds

Disable Diagnostic Web Interface

all

Disable the diagnostic web interface as it's not required for normal operation

Access controller web interface > Configuration > Diagnostic Settings > Disable diagnostic web interface

Restrict Network Access

all

Limit network access to diagnostic interface using firewall rules

Configure firewall to block access to diagnostic interface port (typically TCP 443) except from authorized management systems

🧯 If You Can't Patch

  • Disable diagnostic web interface immediately via controller configuration
  • Implement strict access controls and monitoring for any authenticated users with diagnostic interface access

🔍 How to Verify

Check if Vulnerable:

Check controller firmware version via web interface or CLI and compare against affected versions list

Check Version:

Access controller web interface > System Information > Firmware Version or use Gallagher Command Centre

Verify Fix Applied:

Verify firmware version shows patched version (vCR9.10.240816a or later equivalent) and diagnostic interface remains disabled

📡 Detection & Monitoring

Log Indicators:

  • Unexpected controller reboots
  • Multiple failed authentication attempts to diagnostic interface
  • Buffer overflow errors in system logs

Network Indicators:

  • Unusual traffic patterns to diagnostic interface port
  • Multiple reboot commands sent to controller

SIEM Query:

source="gallagher_controller" AND (event_type="reboot" OR event_type="buffer_overflow")

🔗 References

📤 Share & Export