First published: Tue Sep 15 2020(Updated: )
In Gallagher Command Centre versions 8.10 prior to 8.10.1134(MR4), 8.00 prior to 8.00.1161(MR5), 7.90 prior to 7.90.991(MR5), 7.80 prior to 7.80.960(MR2), 7.70 and earlier, any operator account has access to all data that would be replicated if the system were to be (or is) attached to a multi-server environment. This can include plain text credentials for DVR systems and card details used for physical access/alarm/perimeter components.
Credit: disclosures@gallagher.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gallagher Command Centre | >=7.80<7.80.960 | |
Gallagher Command Centre | >=7.90<7.90.991 | |
Gallagher Command Centre | >=8.00<8.00.1161 | |
Gallagher Command Centre | >=8.10<8.10.1134 | |
Gallagher Command Centre | =7.80.960 | |
Gallagher Command Centre | =7.90.991 | |
Gallagher Command Centre | =8.00.1161 | |
Gallagher Command Centre | =8.10.1134 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16096 is classified as a high severity vulnerability due to unauthorized access to sensitive data.
To mitigate CVE-2020-16096, upgrade to Gallagher Command Centre version 8.10.1134, 8.00.1161, 7.90.991, or 7.80.960 or later.
CVE-2020-16096 affects Gallagher Command Centre versions prior to 8.10.1134, 8.00.1161, 7.90.991, 7.80.960, and earlier versions.
Due to CVE-2020-16096, any operator account can access all data that would be replicated to a multi-server system.
Yes, all operator accounts have the potential to access sensitive data because of the vulnerability in CVE-2020-16096.