First published: Mon Nov 15 2021(Updated: )
Improper certificate validation vulnerability in SMTP Client allows man-in-the-middle attack to retrieve sensitive information from the Command Centre Server. This issue affects: Gallagher Command Centre 8.50 versions prior to 8.50.2048 (MR3); 8.40 versions prior to 8.40.2063 (MR4); 8.30 versions prior to 8.30.1454 (MR4) ; version 8.20 and prior versions.
Credit: disclosures@gallagher.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gallagher Command Centre | <=8.20 | |
Gallagher Command Centre | >=8.30<8.30.1454 | |
Gallagher Command Centre | >=8.40<8.40.2063 | |
Gallagher Command Centre | >=8.50<8.50.2048 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23167 is considered a high severity vulnerability due to the potential for man-in-the-middle attacks.
To fix CVE-2021-23167, upgrade Gallagher Command Centre to version 8.50.2048 or later, or to version 8.40.2063 or later.
CVE-2021-23167 affects Gallagher Command Centre versions prior to 8.50.2048, 8.40.2063, and 8.30.1454.
CVE-2021-23167 exposes users to man-in-the-middle attacks that can lead to the retrieval of sensitive information.
Yes, a patch is available and users can resolve CVE-2021-23167 by updating to the recommended software versions.