Today > | 3 Medium | 2 Low vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-22387

July 11, 2024, 1:05 p.m.

CVSS Score

6.8 / 10

Product(s) Impacted

Gallagher Controller 6000

  • 9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1))
  • 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3))
  • 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4))
  • 8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5))
  • 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7))

Gallagher Controller 7000

  • 9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1))
  • 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3))
  • 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4))
  • 8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5))
  • 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7))

Description

External Control of Critical State Data (CWE-642) in the Controller 6000 and Controller 7000 diagnostic web interface allows an authenticated user to modify device I/O connections leading to unexpected behavior that in some circumstances could compromise site physical security controls. Gallagher recommend the diagnostic web page is not enabled (default is off) unless advised by Gallagher Technical support. This interface is intended only for diagnostic purposes. This issue affects: Gallagher Controller 6000 and 7000 9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)), 8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior.

Weaknesses

CWE-642
External Control of Critical State Data

The product stores security-critical state information about its users, or the product itself, in a location that is accessible to unauthorized actors.

CWE ID: 642

Date

Published: July 11, 2024, 3:15 a.m.

Last Modified: July 11, 2024, 1:05 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

disclosures@gallagher.com

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score
6.8
Exploitability Score
1.6
Impact Score
5.2
Base Severity
MEDIUM
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H

References

https://security.gallagher.com/ disclosures@gallagher.com