CVE-2025-47147

5.7 MEDIUM

📋 TL;DR

This vulnerability allows attackers with physical access to a logged-in operator's mobile device to extract session tokens stored in cleartext. Attackers can then use these tokens to gain unauthorized access to the Command Centre system for a limited duration. This affects Android and iOS users of Command Centre Mobile Client versions before 9.40.123.

💻 Affected Systems

Products:
  • Command Centre Mobile Client
Versions: Versions prior to 9.40.123
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects mobile client applications, not the server components. Requires the app to be installed and an operator to be logged in.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains temporary administrative access to the physical security system, potentially allowing them to disable alarms, unlock doors, or manipulate security settings.

🟠

Likely Case

An attacker with brief physical access to an unlocked device extracts session tokens and gains limited unauthorized access to the security management system.

🟢

If Mitigated

With proper device security controls, the risk is reduced to authorized users who might accidentally expose tokens through device sharing or loss.

🌐 Internet-Facing: LOW - The vulnerability requires physical access to a mobile device, not internet exposure.
🏢 Internal Only: MEDIUM - Risk exists within organizations where mobile devices with the vulnerable app are used by security operators.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires physical access to the mobile device and the ability to extract cleartext data from the app's storage.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.40.123 or later

Vendor Advisory: https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-47147

Restart Required: Yes

Instructions:

1. Update the Command Centre Mobile Client app to version 9.40.123 or later from the official app store. 2. Restart the mobile device after installation. 3. Ensure all operators log out and back in to generate new encrypted session tokens.

🔧 Temporary Workarounds

Enforce Mobile Device Security Policies

all

Implement strict device security controls to prevent unauthorized physical access to operator devices.

Implement Session Timeout Policies

all

Configure the Command Centre server to enforce shorter session timeouts to limit token validity duration.

🧯 If You Can't Patch

  • Implement strict physical security controls for operator mobile devices (screen locks, device encryption, remote wipe capabilities).
  • Enforce policies requiring operators to log out of the mobile app when not actively using it.

🔍 How to Verify

Check if Vulnerable:

Check the app version in the mobile device's app settings. If version is below 9.40.123, the device is vulnerable.

Check Version:

On mobile device: Settings > Apps > Command Centre Mobile Client > App Info

Verify Fix Applied:

Confirm the app version is 9.40.123 or higher in the device's app settings, then verify session tokens are no longer stored in cleartext using mobile security analysis tools.

📡 Detection & Monitoring

Log Indicators:

  • Multiple login attempts from different devices using the same session token
  • Unusual access patterns from mobile devices

Network Indicators:

  • Session tokens transmitted in cleartext (though this is a storage issue, not transmission)

SIEM Query:

source="command_centre" AND (event="multiple_device_login" OR event="suspicious_session_activity")

🔗 References

📤 Share & Export