First published: Mon Dec 18 2023(Updated: )
A reliance on untrusted inputs in a security decision could be exploited by a privileged user to configure the Gallagher Command Centre Diagnostics Service to use less secure communication protocols. This issue affects: Gallagher Diagnostics Service prior to v1.3.0 (distributed in 9.00.1507(MR1)).
Credit: disclosures@gallagher.com
Affected Software | Affected Version | How to fix |
---|---|---|
>=9.00<9.00.1507 | ||
=9.00.1507 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46686 is considered a moderate severity vulnerability due to its potential exploitation by privileged users.
To remediate CVE-2023-46686, upgrade the Gallagher Command Centre Diagnostics Service to version 1.3.0 or later.
CVE-2023-46686 affects users of Gallagher Command Centre versions prior to 1.3.0, specifically those using 9.00.1507.
CVE-2023-46686 is categorized as a vulnerability related to improper input validation in security protocols.
Yes, CVE-2023-46686 can weaken system security by allowing less secure communication protocols to be configured.