CVE-2025-52578

5.7 MEDIUM

📋 TL;DR

This vulnerability involves incorrect seed usage in a pseudo-random number generator in Gallagher High Sec ELM devices, allowing attackers with physical access to potentially compromise internal communications. It affects Command Centre Server versions 9.30, 9.20, 9.10, and all versions of 9.00 and prior. The vulnerability requires physical access to exploit.

💻 Affected Systems

Products:
  • Gallagher Command Centre Server
Versions: 9.30 prior to vCR9.30.251028a, 9.20 prior to vCR9.20.251028a, 9.10 prior to vCR9.10.251028a, all versions of 9.00 and prior
Operating Systems: Not specified in advisory
Default Config Vulnerable: ⚠️ Yes
Notes: Affects High Sec ELM devices; vulnerability requires physical access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access could compromise cryptographic keys or internal communications, potentially gaining unauthorized access to sensitive systems or data.

🟠

Likely Case

Limited impact due to physical access requirement; most likely scenario involves targeted attacks against specific physical devices to intercept or manipulate communications.

🟢

If Mitigated

With proper physical security controls and network segmentation, impact is minimal as the attack vector requires direct physical access to vulnerable devices.

🌐 Internet-Facing: LOW - The vulnerability requires physical access to exploit, making remote exploitation unlikely.
🏢 Internal Only: MEDIUM - Physical access requirement means internal threats or compromised insiders could exploit this, but still requires proximity to devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH - Requires physical access and sophisticated knowledge of cryptographic implementations

Exploitation requires physical access to devices and understanding of the PRNG implementation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vCR9.30.251028a, vCR9.20.251028a, vCR9.10.251028a

Vendor Advisory: https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-52578

Restart Required: Yes

Instructions:

1. Download the appropriate patch version from Gallagher support portal. 2. Backup current configuration. 3. Apply the patch following Gallagher's update procedures. 4. Restart the Command Centre Server. 5. Verify successful update.

🔧 Temporary Workarounds

Physical Security Enhancement

all

Strengthen physical security controls around High Sec ELM devices to prevent unauthorized physical access

Network Segmentation

all

Isolate High Sec ELM devices on separate network segments to limit potential communication compromise impact

🧯 If You Can't Patch

  • Implement strict physical access controls and monitoring for High Sec ELM devices
  • Segment network to isolate vulnerable devices and monitor for unusual communication patterns

🔍 How to Verify

Check if Vulnerable:

Check Command Centre Server version against affected versions list; versions 9.30, 9.20, 9.10 before specified patches, or any 9.00 version are vulnerable

Check Version:

Check version through Gallagher Command Centre interface or consult system documentation

Verify Fix Applied:

Verify Command Centre Server version is at or above vCR9.30.251028a, vCR9.20.251028a, or vCR9.10.251028a depending on base version

📡 Detection & Monitoring

Log Indicators:

  • Physical access logs showing unauthorized access to High Sec ELM devices
  • Unusual communication patterns from ELM devices

Network Indicators:

  • Anomalous traffic patterns from High Sec ELM devices
  • Unexpected cryptographic handshake failures

SIEM Query:

Search for physical access events to ELM devices combined with network anomalies from those devices

🔗 References

📤 Share & Export