First published: Tue Sep 15 2020(Updated: )
It is possible for an unauthenticated remote DCOM websocket connection to crash the Command Centre service due to an out-of-bounds buffer access. Affected versions are v8.20 prior to v8.20.1166(MR3), v8.10 prior to v8.10.1211(MR5), v8.00 prior to v8.00.1228(MR6), all versions of 7.90 and earlier.
Credit: disclosures@gallagher.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gallagher Command Centre | >=8.00<8.00.1228 | |
Gallagher Command Centre | >=8.10<8.10.1211 | |
Gallagher Command Centre | >=8.20<8.20.1166 | |
Gallagher Command Centre | =8.00.1228 | |
Gallagher Command Centre | =8.10.1211 | |
Gallagher Command Centre | =8.20.1166 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-16101 is considered a high severity vulnerability due to the potential for an unauthenticated remote DCOM websocket connection to crash the Command Centre service.
To fix CVE-2020-16101, upgrade to Gallagher Command Centre version 8.20.1166 or later, 8.10.1211 or later, or 8.00.1228 or later.
Affected versions of Gallagher Command Centre include v8.20 prior to v8.20.1166, v8.10 prior to v8.10.1211, v8.00 prior to v8.00.1228, and all versions of 7.90 and earlier.
CVE-2020-16101 is an out-of-bounds buffer access vulnerability that can be exploited remotely.
No, CVE-2020-16101 can be exploited without authentication, making it particularly dangerous.