CVE-2025-41402
BaseFortify
Publication date: 2025-10-23
Last updated on: 2025-10-27
Assigner: Gallagher Group Ltd.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gallagher | command_centre_server | 9.20 |
| gallagher | command_centre_server | 9.10 |
| gallagher | command_centre_server | 9.30 |
| gallagher | command_centre_server | 9.00 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-602 | The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Client-Side Enforcement of Server-Side Security (CWE-602) issue in the Gallagher Command Centre Server. It allows a privileged operator to enter invalid competency data, bypassing expiry checks that are supposed to enforce access control based on competency expirations. Essentially, the system relies on client-side checks that can be circumvented, leading to improper validation of competency data. [1]
How can this vulnerability impact me? :
The vulnerability impacts the integrity of the system by allowing privileged operators to bypass expiry checks on competency data. This means that access control decisions based on competency expirations can be circumvented, potentially allowing unauthorized or unqualified access. However, it does not affect confidentiality or availability of the system. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade the Command Centre Server software to a fixed version: vEL9.30.2482 (MR2) or later for 9.30, vEL9.20.2819 (MR4) or later for 9.20, and vEL9.10.3672 (MR7) or later for 9.10. Avoid using versions 9.00 and earlier as they are affected. Additionally, review and restrict privileged operator access to prevent input of invalid competency data until the update is applied. [1]