CVE-2025-41402
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-23

Last updated on: 2025-10-27

Assigner: Gallagher Group Ltd.

Description
Client-Side Enforcement of Server-Side Security (CWE-602) in the Command Centre Server allows a privileged operator to enter invalid competency data, bypassing expiry checks. This issue affects Command Centre Server: Β 9.30 prior to vEL9.30.2482 (MR2), 9.20 prior to vEL9.20.2819 (MR4), 9.10 prior to vEL9.10.3672 (MR7), all versions of 9.00 and prior.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-23
Last Modified
2025-10-27
Generated
2026-05-07
AI Q&A
2025-10-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
gallagher command_centre_server 9.20
gallagher command_centre_server 9.10
gallagher command_centre_server 9.30
gallagher command_centre_server 9.00
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-602 The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the server.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Client-Side Enforcement of Server-Side Security (CWE-602) issue in the Gallagher Command Centre Server. It allows a privileged operator to enter invalid competency data, bypassing expiry checks that are supposed to enforce access control based on competency expirations. Essentially, the system relies on client-side checks that can be circumvented, leading to improper validation of competency data. [1]


How can this vulnerability impact me? :

The vulnerability impacts the integrity of the system by allowing privileged operators to bypass expiry checks on competency data. This means that access control decisions based on competency expirations can be circumvented, potentially allowing unauthorized or unqualified access. However, it does not affect confidentiality or availability of the system. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade the Command Centre Server software to a fixed version: vEL9.30.2482 (MR2) or later for 9.30, vEL9.20.2819 (MR4) or later for 9.20, and vEL9.10.3672 (MR7) or later for 9.10. Avoid using versions 9.00 and earlier as they are affected. Additionally, review and restrict privileged operator access to prevent input of invalid competency data until the update is applied. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart