CVE-2024-22387

July 11, 2024, 1:05 p.m.

6.8
Medium

Description

External Control of Critical State Data (CWE-642) in the Controller 6000 and Controller 7000 diagnostic web interface allows an authenticated user to modify device I/O connections leading to unexpected behavior that in some circumstances could compromise site physical security controls. Gallagher recommend the diagnostic web page is not enabled (default is off) unless advised by Gallagher Technical support. This interface is intended only for diagnostic purposes. This issue affects: Gallagher Controller 6000 and 7000 9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)), 8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior.

Product(s) Impacted

Product Versions
Gallagher Controller 6000
  • ['9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1))', '9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3))', '8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4))', '8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5))', '8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7))']
Gallagher Controller 7000
  • ['9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1))', '9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3))', '8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4))', '8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5))', '8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7))']

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-642
External Control of Critical State Data
The product stores security-critical state information about its users, or the product itself, in a location that is accessible to unauthorized actors.

CVSS Score

6.8 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H

    View Vector String

Timeline

Published: July 11, 2024, 3:15 a.m.
Last Modified: July 11, 2024, 1:05 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

disclosures@gallagher.com

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.