CVE-2025-52457

5.7 MEDIUM

📋 TL;DR

A timing side-channel vulnerability in HBUS devices allows attackers with physical access to extract cryptographic keys through timing analysis. This compromises device-specific security and could enable broader site security breaches. Affected systems include Gallagher Command Centre Server versions 9.30, 9.20, 9.10, and all versions of 9.00 and prior.

💻 Affected Systems

Products:
  • Gallagher Command Centre Server
Versions: 9.30 prior to vCR9.30.251028a (distributed in 9.30.2881 (MR3)), 9.20 prior to vCR9.20.251028a (distributed in 9.20.3265 (MR5)), 9.10 prior to vCR9.10.251028a (distributed in 9.10.4135 (MR8)), all versions of 9.00 and prior
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Requires physical access to HBUS devices connected to vulnerable Command Centre Server installations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of site security systems, unauthorized access to secure areas, and potential physical security breaches.

🟠

Likely Case

Extraction of device keys enabling unauthorized access to specific HBUS-connected devices and limited system components.

🟢

If Mitigated

Limited impact due to physical access requirements and key extraction requiring specialized equipment and expertise.

🌐 Internet-Facing: LOW - Requires physical access to HBUS devices, not exploitable remotely.
🏢 Internal Only: MEDIUM - Physical access to HBUS devices needed, but insider threats or unauthorized physical access could exploit.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires physical access to HBUS devices, specialized timing measurement equipment, and cryptographic analysis expertise.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vCR9.30.251028a (9.30.2881 MR3), vCR9.20.251028a (9.20.3265 MR5), vCR9.10.251028a (9.10.4135 MR8)

Vendor Advisory: https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-52457

Restart Required: Yes

Instructions:

1. Download appropriate patch version from Gallagher support portal. 2. Backup current configuration. 3. Apply patch following Gallagher installation procedures. 4. Restart Command Centre Server services. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Physical Access Control Enhancement

all

Strengthen physical security controls around HBUS devices to prevent unauthorized physical access.

Network Segmentation

all

Isolate HBUS network segments from general corporate networks to limit potential lateral movement.

🧯 If You Can't Patch

  • Implement strict physical access controls and monitoring for all HBUS device locations
  • Consider replacing affected HBUS devices with newer models not vulnerable to timing attacks

🔍 How to Verify

Check if Vulnerable:

Check Command Centre Server version via admin interface or configuration files against affected version ranges.

Check Version:

Check Gallagher Command Centre Server admin interface or consult server documentation for version query commands.

Verify Fix Applied:

Verify installed version matches or exceeds patched versions: 9.30.2881 MR3, 9.20.3265 MR5, or 9.10.4135 MR8.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized physical access logs to server rooms or device locations
  • Unusual timing analysis equipment detection

Network Indicators:

  • Unusual HBUS protocol traffic patterns
  • Unexpected cryptographic operations

SIEM Query:

Search for physical access violations near HBUS device locations OR unauthorized equipment detection events

🔗 References

📤 Share & Export