CVE-2026-20801
📋 TL;DR
This vulnerability allows unprivileged users on the local network to view live video streams transmitted in cleartext. It affects Gallagher NxWitness VMS integration versions before 9.10.017 and Gallagher Hanwha VMS integration versions before 9.10.025.
💻 Affected Systems
- Gallagher NxWitness VMS integration
- Gallagher Hanwha VMS integration
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Unauthorized surveillance of sensitive video feeds, potential privacy violations, and exposure of security camera footage to attackers on the local network.
Likely Case
Internal users or attackers with local network access can view live video streams they shouldn't have access to, compromising privacy and security monitoring.
If Mitigated
If proper network segmentation and access controls are in place, only authorized users within the video management network segment can access streams.
🎯 Exploit Status
Exploitation requires local network access but no authentication or special privileges.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: NxWitness VMS integration: 9.10.017 or later; Hanwha VMS integration: 9.10.025 or later
Vendor Advisory: https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2026-20801
Restart Required: Yes
Instructions:
1. Download the updated integration version from Gallagher. 2. Install the update following vendor documentation. 3. Restart the VMS services. 4. Verify the version is updated.
🔧 Temporary Workarounds
Network Segmentation
allIsolate video management systems on a separate VLAN to restrict local network access.
Access Control Lists
allImplement firewall rules to restrict access to video stream ports from unauthorized IPs.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate VMS components from general network traffic.
- Monitor network traffic for unauthorized access attempts to video stream ports.
🔍 How to Verify
Check if Vulnerable:
Check the integration version in the VMS administration interface. If NxWitness integration is below 9.10.017 or Hanwha integration is below 9.10.025, the system is vulnerable.
Check Version:
Check via VMS admin interface; specific command depends on deployment.
Verify Fix Applied:
Confirm the integration version is 9.10.017 or later for NxWitness, or 9.10.025 or later for Hanwha. Test that video streams are now encrypted.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to video stream endpoints
- Cleartext video transmission logs
Network Indicators:
- Unencrypted video traffic on local network
- Unexpected connections to video stream ports
SIEM Query:
source_ip IN (local_network) AND dest_port IN (video_stream_ports) AND protocol = 'unencrypted'