First published: Wed Jul 06 2022(Updated: )
Gallagher Controller 6000 is vulnerable to a Denial of Service attack via conflicting ARP packets with a duplicate IP address. This issue affects: Gallagher Gallagher Controller 6000 vCR8.60 versions prior to 220303a; vCR8.50 versions prior to 220303a; vCR8.40 versions prior to 220303a; vCR8.30 versions prior to 220303a.
Credit: disclosures@gallagher.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gallagher Controller 6000 Firmware | >=8.30<8.30.220303a | |
Gallagher Controller 6000 Firmware | >=8.40<8.40.220303a | |
Gallagher Controller 6000 Firmware | >=8.50<8.50.220303a | |
Gallagher Controller 6000 Firmware | >=8.60<8.60.220303a | |
Gallagher Controller 6000 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-26078 is classified as a Denial of Service vulnerability affecting the Gallagher Controller 6000.
To fix CVE-2022-26078, upgrade the Gallagher Controller 6000 firmware to version 220303a or later for the affected versions.
CVE-2022-26078 affects Gallagher Controller 6000 firmware versions vCR8.30 through vCR8.60 prior to 220303a.
CVE-2022-26078 is associated with a Denial of Service attack caused by conflicting ARP packets with a duplicate IP address.
Yes, CVE-2022-26078 can potentially be exploited remotely through ARP packet manipulation.