CVE-2025-41402

5.5 MEDIUM

📋 TL;DR

This vulnerability allows privileged operators in Gallagher Command Centre Server to bypass expiry checks when entering competency data due to client-side enforcement of server-side security. It affects Gallagher Command Centre Server versions 9.30 prior to vEL9.30.2482, 9.20 prior to vEL9.20.2819, 9.10 prior to vEL9.10.3672, and all versions of 9.00 and earlier.

💻 Affected Systems

Products:
  • Gallagher Command Centre Server
Versions: 9.30 prior to vEL9.30.2482 (MR2), 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), all versions of 9.00 and prior
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires privileged operator access to exploit. All default configurations of affected versions are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged operators could maintain access to systems or data beyond authorized timeframes, potentially leading to unauthorized access to sensitive security systems or data manipulation.

🟠

Likely Case

Privileged operators bypassing competency expiry checks to maintain access they should no longer have, violating access control policies.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to policy violations that can be detected and corrected.

🌐 Internet-Facing: LOW - This requires privileged operator access and is not directly exploitable from the internet.
🏢 Internal Only: MEDIUM - Requires privileged operator credentials but could be exploited by malicious insiders or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires privileged operator credentials and knowledge of the vulnerability. Exploitation involves entering invalid competency data to bypass expiry checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vEL9.30.2482 (MR2) for 9.30, vEL9.20.2819 (MR4) for 9.20, vEL9.10.3672 (MR7) for 9.10

Vendor Advisory: https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-41402

Restart Required: No

Instructions:

1. Identify your Command Centre Server version. 2. Download appropriate patch from Gallagher support portal. 3. Apply patch according to Gallagher documentation. 4. Verify patch installation.

🔧 Temporary Workarounds

Enhanced Monitoring and Auditing

all

Implement strict monitoring of operator competency data changes and access logs to detect potential exploitation.

Privilege Reduction

all

Review and reduce the number of privileged operators to minimize attack surface.

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles for all operator accounts
  • Enable detailed auditing of all competency data modifications and access attempts

🔍 How to Verify

Check if Vulnerable:

Check Command Centre Server version against affected versions list. If running 9.30 prior to vEL9.30.2482, 9.20 prior to vEL9.20.2819, 9.10 prior to vEL9.10.3672, or any 9.00 version, you are vulnerable.

Check Version:

Check version through Command Centre Server administration interface or Gallagher management tools

Verify Fix Applied:

Verify Command Centre Server version shows patched version: vEL9.30.2482 or higher for 9.30, vEL9.20.2819 or higher for 9.20, vEL9.10.3672 or higher for 9.10.

📡 Detection & Monitoring

Log Indicators:

  • Unusual competency data modifications
  • Operator access outside of authorized timeframes
  • Multiple competency data entry attempts

Network Indicators:

  • Unusual patterns of administrative access to Command Centre Server

SIEM Query:

Search for competency data modification events followed by operator access outside normal hours or beyond expected expiry dates

🔗 References

📤 Share & Export