CVE-2025-44003

4.3 MEDIUM

📋 TL;DR

A resource management vulnerability in Gallagher T-Series Readers allows attackers with physical access to cause limited denial of service when 125 kHz Card Technology is enabled. This affects T-Series Readers running vulnerable firmware versions. Physical proximity to the reader is required for exploitation.

💻 Affected Systems

Products:
  • Gallagher T-Series Reader
Versions: 9.20 prior to vCR9.20.250213a, 9.10 prior to vCR9.10.250213a, 9.00 prior to vCR9.00.250619a, all versions of 8.90 and prior
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when 125 kHz Card Technology is enabled on the reader.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Physical attacker disables 125 kHz card reading functionality on affected readers, preventing access for users with those cards until system restart or recovery.

🟠

Likely Case

Limited denial of service affecting only 125 kHz card technology functionality on individual readers, requiring physical access and specific configuration.

🟢

If Mitigated

No impact if 125 kHz technology is disabled or physical access controls prevent unauthorized access to readers.

🌐 Internet-Facing: LOW - Requires physical access to the reader device, not network exploitation.
🏢 Internal Only: MEDIUM - Physical access to readers in controlled areas could disrupt access control for 125 kHz card users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Requires physical access to the reader device and 125 kHz technology enabled. No authentication or special tools required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vCR9.20.250213a, vCR9.10.250213a, vCR9.00.250619a

Vendor Advisory: https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-44003

Restart Required: Yes

Instructions:

1. Download appropriate firmware update from Gallagher portal. 2. Apply update to affected T-Series Readers via Gallagher Command Centre. 3. Restart readers after update completion.

🔧 Temporary Workarounds

Disable 125 kHz Card Technology

all

Disable the vulnerable 125 kHz functionality on affected readers

Configure via Gallagher Command Centre: Reader Configuration > Card Technologies > Disable 125 kHz

Enhance Physical Security

all

Implement additional physical security controls around reader installations

🧯 If You Can't Patch

  • Disable 125 kHz Card Technology on all affected readers
  • Implement enhanced physical security controls and monitoring around reader locations

🔍 How to Verify

Check if Vulnerable:

Check Gallagher Command Centre for reader firmware versions and verify if 125 kHz technology is enabled.

Check Version:

Check via Gallagher Command Centre: Device Management > Readers > Select Reader > Firmware Version

Verify Fix Applied:

Confirm firmware version shows patched version (vCR9.20.250213a, vCR9.10.250213a, or vCR9.00.250619a) in Gallagher Command Centre.

📡 Detection & Monitoring

Log Indicators:

  • Reader restart events
  • 125 kHz card technology errors or failures
  • Unexpected reader offline events

Network Indicators:

  • No network indicators - physical access required

SIEM Query:

Search for: 'T-Series Reader' AND ('restart' OR 'failure' OR '125kHz error') in Gallagher system logs

🔗 References

📤 Share & Export