CVE-2025-47699

9.9 CRITICAL

📋 TL;DR

This vulnerability in Gallagher Command Centre Server allows authenticated operators with limited site permissions to make unauthorized critical changes to local Morpho devices. It affects multiple versions of Command Centre Server, potentially enabling privilege escalation and unauthorized device modifications.

💻 Affected Systems

Products:
  • Gallagher Command Centre Server
Versions: 9.30 prior to vEL9.30.2482 (MR2), 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), 9.00 prior to vEL9.00.3831 (MR8), all versions of 8.90 and prior
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated operator access with limited site permissions

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated operator could reconfigure or disable critical Morpho security devices, potentially compromising physical security controls and allowing unauthorized access to secured areas.

🟠

Likely Case

Limited operators could modify Morpho device settings beyond their intended permissions, potentially disrupting normal operations or creating security gaps.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to authorized changes within operator permissions.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but with limited permissions

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vEL9.30.2482 (MR2), vEL9.20.2819 (MR4), vEL9.10.3672 (MR7), vEL9.00.3831 (MR8)

Vendor Advisory: https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-47699

Restart Required: Yes

Instructions:

1. Download appropriate patch version for your Command Centre Server version. 2. Apply patch following Gallagher's update procedures. 3. Restart Command Centre Server services.

🔧 Temporary Workarounds

Restrict Operator Permissions

all

Temporarily reduce operator permissions to minimum required for their role

Enhanced Monitoring

all

Implement additional logging and monitoring for Morpho device configuration changes

🧯 If You Can't Patch

  • Implement strict access controls and review all operator permissions
  • Enable detailed audit logging for all Morpho device configuration changes

🔍 How to Verify

Check if Vulnerable:

Check Command Centre Server version against affected versions list

Check Version:

Check version in Command Centre Server administration interface or configuration files

Verify Fix Applied:

Verify Command Centre Server version is at or above patched versions

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized Morpho device configuration changes
  • Operator actions exceeding their permission level

Network Indicators:

  • Unusual configuration traffic to Morpho devices

SIEM Query:

Search for 'Morpho configuration change' events from operators with limited permissions

🔗 References

📤 Share & Export