CVE-2025-64734

2.4 LOW

📋 TL;DR

A resource management vulnerability (CWE-772) in Gallagher Command Centre T21 Reader allows attackers with physical access to cause a denial-of-service, preventing cardholders from using the reader for entry. This affects Command Centre Server versions 9.30, 9.20, 9.10, and all versions of 9.00 and earlier. The vulnerability requires physical access to the reader device.

💻 Affected Systems

Products:
  • Gallagher Command Centre Server
Versions: 9.30 prior to vCR9.30.251028a (distributed in 9.30.2881 MR3), 9.20 prior to vCR9.20.251028a (distributed in 9.20.3265 MR5), 9.10 prior to vCR9.10.251028a (distributed in 9.10.4135 MR8), all versions of 9.00 and prior
Operating Systems: Not specified - likely Windows Server based on Gallagher Command Centre architecture
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using T21 Readers. Requires physical access to the reader device itself.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Physical attacker permanently disables a T21 Reader, requiring hardware replacement and preventing all badge-based access through that reader until resolved.

🟠

Likely Case

Physical attacker temporarily disables a T21 Reader, requiring manual reboot or maintenance intervention to restore functionality.

🟢

If Mitigated

With proper physical security controls preventing unauthorized access to readers, impact is minimal to none.

🌐 Internet-Facing: LOW - Vulnerability requires physical access to the reader hardware, not network access.
🏢 Internal Only: MEDIUM - Physical access to readers could be obtained by insiders or visitors in poorly secured areas.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Physical access to reader is the main requirement

Exploitation requires physical interaction with the T21 Reader hardware. No network-based exploitation is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vCR9.30.251028a (in 9.30.2881 MR3), vCR9.20.251028a (in 9.20.3265 MR5), vCR9.10.251028a (in 9.10.4135 MR8)

Vendor Advisory: https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-64734

Restart Required: Yes

Instructions:

1. Download appropriate patch from Gallagher support portal. 2. Apply patch to Command Centre Server. 3. Restart Command Centre Server services. 4. Verify T21 Readers reconnect and function normally.

🔧 Temporary Workarounds

Physical Security Enhancement

all

Strengthen physical security around T21 Readers to prevent unauthorized access

Reader Monitoring

all

Implement monitoring for T21 Reader status and alert on reader disconnections

🧯 If You Can't Patch

  • Implement strict physical access controls to prevent unauthorized personnel from accessing T21 Readers
  • Establish rapid response procedures for reader failures including manual reboot procedures

🔍 How to Verify

Check if Vulnerable:

Check Command Centre Server version in Gallagher Command Centre interface. If version is 9.30 prior to 9.30.2881 MR3, 9.20 prior to 9.20.3265 MR5, 9.10 prior to 9.10.4135 MR8, or any 9.00 version, system is vulnerable.

Check Version:

Check version in Gallagher Command Centre web interface under Help > About or via server console

Verify Fix Applied:

Verify Command Centre Server version shows patched version (9.30.2881 MR3, 9.20.3265 MR5, or 9.10.4135 MR8) and all T21 Readers are functioning normally.

📡 Detection & Monitoring

Log Indicators:

  • T21 Reader disconnection events
  • Reader communication failures
  • Unexpected reader reboots

Network Indicators:

  • Loss of communication with specific T21 Readers

SIEM Query:

source="gallagher_command_centre" AND (event_type="reader_disconnect" OR event_type="reader_error") AND reader_model="T21"

🔗 References

📤 Share & Export