CVE-2024-43107

7.2 HIGH

📋 TL;DR

CVE-2024-43107 is an improper certificate validation vulnerability in Gallagher's Milestone Integration Plugin that allows unauthenticated messages (including alarm events) to be sent to the plugin. This affects Gallagher MIPS Plugin v4.0 prior to v4.0.32 and all versions of v3.0 and earlier. Organizations using these versions for physical security integration are vulnerable.

💻 Affected Systems

Products:
  • Gallagher Milestone Integration Plugin (MIP)
Versions: v4.0 prior to v4.0.32, all versions of v3.0 and prior
Operating Systems: Windows (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems using Gallagher MIP for integration between Gallagher Command Centre and Milestone XProtect VMS.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject false alarm events, manipulate security system responses, or potentially chain with other vulnerabilities to compromise physical security systems.

🟠

Likely Case

Unauthenticated attackers sending spoofed alarm events to trigger false alerts or disrupt security monitoring operations.

🟢

If Mitigated

Limited to denial-of-service through false alarms if proper network segmentation and monitoring are in place.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated exploitation, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to manipulate security systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability specifically allows unauthenticated messages, making exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.0.32 or later

Vendor Advisory: https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2024-43107

Restart Required: Yes

Instructions:

1. Download v4.0.32 or later from Gallagher support portal. 2. Backup current configuration. 3. Stop the MIP service. 4. Install the update. 5. Restart the MIP service. 6. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the MIP service to only trusted systems (Milestone servers and Gallagher Command Centre).

Firewall Rules

all

Implement strict firewall rules to limit inbound connections to the MIP service port (typically TCP 8080).

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the MIP service from untrusted networks
  • Monitor network traffic to the MIP service for unusual patterns or unauthorized connections

🔍 How to Verify

Check if Vulnerable:

Check the MIP version in the plugin interface or installation directory. Versions v4.0 prior to v4.0.32 or any v3.x are vulnerable.

Check Version:

Check the version in the MIP web interface or examine the installation directory for version information.

Verify Fix Applied:

Verify the version shows v4.0.32 or later in the MIP interface and test that only authenticated messages are accepted.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated connection attempts to MIP service
  • Unexpected alarm events from unknown sources
  • Failed certificate validation logs

Network Indicators:

  • Unusual traffic patterns to MIP service port (typically 8080)
  • Connections from unexpected IP addresses to MIP service

SIEM Query:

source_ip NOT IN (trusted_ips) AND dest_port=8080 AND protocol=TCP

🔗 References

📤 Share & Export