Vulnerabilites related to gallagher - controller_6000_firmware
CVE-2023-24584 (GCVE-0-2023-24584)
Vulnerability from cvelistv5
Published
2023-06-01 04:08
Modified
2025-01-10 18:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
Controller 6000 is vulnerable to a buffer overflow via the Controller diagnostic web interface upload feature.
This issue affects Controller 6000: before vCR8.80.230201a, before vCR8.70.230201a, before vCR8.60.230201b, before vCR8.50.230201a, all versions of vCR8.40 and prior.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Gallagher | Controller 6000 |
Version: 0 < vCR8.80.230201a Version: 0 < vCR8.70.230201a Version: 0 < vCR8.60.230201b Version: 0 < vCR8.50.230201a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:03:18.735Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2023-24584" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-24584", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-10T18:46:54.400796Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-10T18:47:07.773Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Controller 6000", "vendor": "Gallagher", "versions": [ { "lessThan": "vCR8.80.230201a", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vCR8.70.230201a", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vCR8.60.230201b", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vCR8.50.230201a", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eController 6000 is vulnerable to a buffer overflow via the Controller diagnostic web interface upload feature. \u003c/span\u003e\n\n\u003cbr\u003e\u003c/p\u003e\u003cp\u003eThis issue affects Controller 6000: before vCR8.80.230201a, before vCR8.70.230201a, before vCR8.60.230201b, before vCR8.50.230201a,\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eall versions of vCR8.40 and prior.\u003c/span\u003e\u003c/p\u003e" } ], "value": "\nController 6000 is vulnerable to a buffer overflow via the Controller diagnostic web interface upload feature. \n\n\n\n\nThis issue affects Controller 6000: before vCR8.80.230201a, before vCR8.70.230201a, before vCR8.60.230201b, before vCR8.50.230201a,\u00a0all versions of vCR8.40 and prior.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-01T04:08:35.754Z", "orgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc", "shortName": "Gallagher" }, "references": [ { "url": "https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2023-24584" } ], "source": { "discovery": "UNKNOWN" }, "title": "Controller 6000 buffer overflow via upload feature in web interface", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eEnsure dipswitch 1 is turned off on all Controllers and the option, \"Dipswitch 1 controls the diagnostic web interface\", is not checked in Configuration Client on Controller property pages. Do not use the Controller override, \"Enable WWW Connections\". Refer to the Gallagher Command Centre Hardening Guide for more details.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nEnsure dipswitch 1 is turned off on all Controllers and the option, \"Dipswitch 1 controls the diagnostic web interface\", is not checked in Configuration Client on Controller property pages. Do not use the Controller override, \"Enable WWW Connections\". Refer to the Gallagher Command Centre Hardening Guide for more details.\n\n\n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc", "assignerShortName": "Gallagher", "cveId": "CVE-2023-24584", "datePublished": "2023-06-01T04:08:35.754Z", "dateReserved": "2023-02-03T20:38:05.230Z", "dateUpdated": "2025-01-10T18:47:07.773Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22439 (GCVE-0-2023-22439)
Vulnerability from cvelistv5
Published
2023-12-18 21:58
Modified
2024-08-02 10:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Improper input validation of a large HTTP request in the Controller 6000 and Controller 7000 optional diagnostic web interface (Port 80) can be used to perform a Denial of Service of the diagnostic web interface.
This issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Gallagher | Controller 6000/ Controller 7000 |
Version: 0 < Version: 8.90 < vCR8.90.231204a Version: 8.80 < vCR8.80.231204a Version: 8.70 < vCR8.70.231204a Version: 8.60 < vCR8.60.231116a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.573Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-22439" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Controller 6000/ Controller 7000", "vendor": "Gallagher", "versions": [ { "lessThanOrEqual": "8.50", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vCR8.90.231204a", "status": "affected", "version": "8.90", "versionType": "custom" }, { "lessThan": "vCR8.80.231204a", "status": "affected", "version": "8.80", "versionType": "custom" }, { "lessThan": "vCR8.70.231204a", "status": "affected", "version": "8.70", "versionType": "custom" }, { "lessThan": "vCR8.60.231116a", "status": "affected", "version": "8.60", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Sebastian Toscano of Amazon Security" }, { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Kevin Schaller of Amazon Security" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper input validation of a large HTTP request in the Controller 6000 and Controller 7000\u003c/span\u003e\u003cstrong\u003e\u0026nbsp;\u003c/strong\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eoptional\u003c/span\u003e\u003cstrong\u003e\u0026nbsp;\u003c/strong\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ediagnostic web interface (Port 80)\u003c/span\u003e\u003cstrong\u003e\u0026nbsp;\u003c/strong\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ecan be used to perform a Denial of Service of the diagnostic web interface.\u003cbr\u003e\u003cbr\u003eThis issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.\u003c/span\u003e\n\n" } ], "value": "\nImproper input validation of a large HTTP request in the Controller 6000 and Controller 7000\u00a0optional\u00a0diagnostic web interface (Port 80)\u00a0can be used to perform a Denial of Service of the diagnostic web interface.\n\nThis issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-18T21:58:41.026Z", "orgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc", "shortName": "Gallagher" }, "references": [ { "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-22439" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc", "assignerShortName": "Gallagher", "cveId": "CVE-2023-22439", "datePublished": "2023-12-18T21:58:41.026Z", "dateReserved": "2023-02-03T20:38:05.234Z", "dateUpdated": "2024-08-02T10:07:06.573Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-41967 (GCVE-0-2023-41967)
Vulnerability from cvelistv5
Published
2023-12-18 22:00
Modified
2024-08-02 19:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1272 - Sensitive Information Uncleared Before Debug/Power State Transition
Summary
Sensitive information uncleared after debug/power state transition in the Controller 6000 could be abused by an attacker with knowledge of the Controller's default diagnostic password and physical access to the Controller to view its configuration through the diagnostic web pages.
This issue affects: Gallagher Controller 6000 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), v8.60 or earlier.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Gallagher | Controller 6000 |
Version: 0 < Version: 8.70 < vCR8.70.231204a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-41967" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Controller 6000", "vendor": "Gallagher", "versions": [ { "lessThanOrEqual": "8.60", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "vCR8.70.231204a", "status": "affected", "version": "8.70", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSensitive information uncleared after debug/power state transition in the Controller 6000 could be abused by an attacker with knowledge of the Controller\u0027s default diagnostic password and physical access to the Controller to view its configuration through the diagnostic web pages. \u003cbr\u003e\u003cbr\u003eThis issue affects: Gallagher Controller 6000 \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ev8.60 or earlier.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "\nSensitive information uncleared after debug/power state transition in the Controller 6000 could be abused by an attacker with knowledge of the Controller\u0027s default diagnostic password and physical access to the Controller to view its configuration through the diagnostic web pages. \n\nThis issue affects: Gallagher Controller 6000 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), v8.60 or earlier.\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1272", "description": "CWE-1272: Sensitive Information Uncleared Before Debug/Power State Transition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-18T22:00:38.751Z", "orgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc", "shortName": "Gallagher" }, "references": [ { "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-41967" } ], "source": { "discovery": "INTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc", "assignerShortName": "Gallagher", "cveId": "CVE-2023-41967", "datePublished": "2023-12-18T22:00:38.751Z", "dateReserved": "2023-11-01T22:24:52.305Z", "dateUpdated": "2024-08-02T19:09:49.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-24590 (GCVE-0-2023-24590)
Vulnerability from cvelistv5
Published
2023-12-18 22:00
Modified
2024-08-02 11:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-134 - Use of Externally-Controlled Format String
Summary
A format string issue in the Controller 6000's optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service.
This issue affects: Gallagher Controller 6000 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Gallagher | Controller 6000 |
Version: 0 < Version: 8.60 < 8.60.231116a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:03:19.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-24590" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Controller 6000", "vendor": "Gallagher", "versions": [ { "lessThanOrEqual": "8.50", "status": "affected", "version": "0", "versionType": "custom" }, { "lessThan": "8.60.231116a", "status": "affected", "version": "8.60", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Sebastian Toscano of Amazon Security" }, { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Kevin Schaller of Amazon Security" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA format string issue in the Controller 6000\u0027s optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service.\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis issue affects: Gallagher Controller 6000 \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eall versions of 8.50 and prior.\u003c/span\u003e\n\n\n\n" } ], "value": "\n\n\nA format string issue in the Controller 6000\u0027s optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service.\n\nThis issue affects: Gallagher Controller 6000 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134 Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-18T22:00:17.083Z", "orgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc", "shortName": "Gallagher" }, "references": [ { "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-24590" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc", "assignerShortName": "Gallagher", "cveId": "CVE-2023-24590", "datePublished": "2023-12-18T22:00:17.083Z", "dateReserved": "2023-02-03T20:38:05.209Z", "dateUpdated": "2024-08-02T11:03:19.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-26078 (GCVE-0-2022-26078)
Vulnerability from cvelistv5
Published
2022-07-06 16:29
Modified
2024-08-03 04:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-754 - Improper Check for Unusual or Exceptional Conditions
Summary
Gallagher Controller 6000 is vulnerable to a Denial of Service attack via conflicting ARP packets with a duplicate IP address. This issue affects: Gallagher Gallagher Controller 6000 vCR8.60 versions prior to 220303a; vCR8.50 versions prior to 220303a; vCR8.40 versions prior to 220303a; vCR8.30 versions prior to 220303a.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Gallagher | Gallagher Controller 6000 |
Version: vCR8.60 < 220303a Version: vCR8.50 < 220303a Version: vCR8.40 < 220303a Version: vCR8.30 < 220303a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:56:37.504Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2022-26078" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Gallagher Controller 6000", "vendor": "Gallagher", "versions": [ { "lessThan": "220303a", "status": "affected", "version": "vCR8.60", "versionType": "custom" }, { "lessThan": "220303a", "status": "affected", "version": "vCR8.50", "versionType": "custom" }, { "lessThan": "220303a", "status": "affected", "version": "vCR8.40", "versionType": "custom" }, { "lessThan": "220303a", "status": "affected", "version": "vCR8.30", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Gallagher Controller 6000 is vulnerable to a Denial of Service attack via conflicting ARP packets with a duplicate IP address. This issue affects: Gallagher Gallagher Controller 6000 vCR8.60 versions prior to 220303a; vCR8.50 versions prior to 220303a; vCR8.40 versions prior to 220303a; vCR8.30 versions prior to 220303a." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754 Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-06T16:29:29", "orgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc", "shortName": "Gallagher" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2022-26078" } ], "source": { "discovery": "USER" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "disclosures@gallagher.com", "ID": "CVE-2022-26078", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Gallagher Controller 6000", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "vCR8.60", "version_value": "220303a" }, { "version_affected": "\u003c", "version_name": "vCR8.50", "version_value": "220303a" }, { "version_affected": "\u003c", "version_name": "vCR8.40", "version_value": "220303a" }, { "version_affected": "\u003c", "version_name": "vCR8.30", "version_value": "220303a" } ] } } ] }, "vendor_name": "Gallagher" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Gallagher Controller 6000 is vulnerable to a Denial of Service attack via conflicting ARP packets with a duplicate IP address. This issue affects: Gallagher Gallagher Controller 6000 vCR8.60 versions prior to 220303a; vCR8.50 versions prior to 220303a; vCR8.40 versions prior to 220303a; vCR8.30 versions prior to 220303a." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-754 Improper Check for Unusual or Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.gallagher.com/Security-Advisories/CVE-2022-26078", "refsource": "MISC", "url": "https://security.gallagher.com/Security-Advisories/CVE-2022-26078" } ] }, "source": { "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "0c426f27-3ee1-4eff-be88-288d5a1822bc", "assignerShortName": "Gallagher", "cveId": "CVE-2022-26078", "datePublished": "2022-07-06T16:29:29", "dateReserved": "2022-03-04T00:00:00", "dateUpdated": "2024-08-03T04:56:37.504Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-12-18 22:15
Modified
2024-11-21 08:22
Severity ?
2.4 (Low) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
4.6 (Medium) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Sensitive information uncleared after debug/power state transition in the Controller 6000 could be abused by an attacker with knowledge of the Controller's default diagnostic password and physical access to the Controller to view its configuration through the diagnostic web pages.
This issue affects: Gallagher Controller 6000 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), v8.60 or earlier.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5B756DF-6D8A-4B89-9DAB-3EBD00C75E3A", "versionEndIncluding": "8.60", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30EEB0FF-D2F2-47DA-9666-6532730B195F", "versionEndExcluding": "8.70.231204a", "versionStartIncluding": "8.70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF2B03B-B033-439F-8CEE-334FA8053278", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nSensitive information uncleared after debug/power state transition in the Controller 6000 could be abused by an attacker with knowledge of the Controller\u0027s default diagnostic password and physical access to the Controller to view its configuration through the diagnostic web pages. \n\nThis issue affects: Gallagher Controller 6000 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), v8.60 or earlier.\n\n\n" }, { "lang": "es", "value": "Un atacante con conocimiento de la contrase\u00f1a de diagn\u00f3stico predeterminada de Controller 6000 y acceso f\u00edsico al Controlador para ver su configuraci\u00f3n a trav\u00e9s de las p\u00e1ginas web de diagn\u00f3stico podr\u00eda abusar de la informaci\u00f3n confidencial no borrada despu\u00e9s de la transici\u00f3n del estado de depuraci\u00f3n/encendido en el Controlador. Este problema afecta a: Gallagher Controller 6000 8.70 anterior a vCR8.70.231204a (distribuido en 8.70.2375 (MR5)), v8.60 o anterior." } ], "id": "CVE-2023-41967", "lastModified": "2024-11-21T08:22:00.680", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "disclosures@gallagher.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-18T22:15:08.770", "references": [ { "source": "disclosures@gallagher.com", "tags": [ "Vendor Advisory" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-41967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-41967" } ], "sourceIdentifier": "disclosures@gallagher.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1272" } ], "source": "disclosures@gallagher.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-212" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-01 05:15
Modified
2024-11-21 07:48
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Controller 6000 is vulnerable to a buffer overflow via the Controller diagnostic web interface upload feature.
This issue affects Controller 6000: before vCR8.80.230201a, before vCR8.70.230201a, before vCR8.60.230201b, before vCR8.50.230201a, all versions of vCR8.40 and prior.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2145115-B3C0-450E-B8E4-F9E0CA60E532", "versionEndExcluding": "8.50.230201a", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C59CC87-0F34-4B34-A8E9-4A8EC922067F", "versionEndExcluding": "8.60.230201b", "versionStartIncluding": "8.60", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33EB0365-40C7-4750-A013-37B655A24FE4", "versionEndExcluding": "8.70.230201a", "versionStartIncluding": "8.70", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F952C1B-EA21-4179-A8CF-84952EBE2478", "versionEndExcluding": "8.80.230201a", "versionStartIncluding": "8.80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF2B03B-B033-439F-8CEE-334FA8053278", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nController 6000 is vulnerable to a buffer overflow via the Controller diagnostic web interface upload feature. \n\n\n\n\nThis issue affects Controller 6000: before vCR8.80.230201a, before vCR8.70.230201a, before vCR8.60.230201b, before vCR8.50.230201a,\u00a0all versions of vCR8.40 and prior.\n\n" } ], "id": "CVE-2023-24584", "lastModified": "2024-11-21T07:48:10.787", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "disclosures@gallagher.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-01T05:15:09.767", "references": [ { "source": "disclosures@gallagher.com", "tags": [ "Vendor Advisory" ], "url": "https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2023-24584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2023-24584" } ], "sourceIdentifier": "disclosures@gallagher.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "disclosures@gallagher.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-18 22:15
Modified
2024-11-21 07:48
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
A format string issue in the Controller 6000's optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service.
This issue affects: Gallagher Controller 6000 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3183049E-D5F5-416E-B5B6-140B02510BC0", "versionEndIncluding": "8.50", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "162DF4B0-4F15-48D0-9D67-2AD509FD1FAD", "versionEndExcluding": "8.60.231116a", "versionStartIncluding": "8.60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF2B03B-B033-439F-8CEE-334FA8053278", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\n\n\nA format string issue in the Controller 6000\u0027s optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service.\n\nThis issue affects: Gallagher Controller 6000 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.\n\n\n\n" }, { "lang": "es", "value": "Un problema de cadena de formato en la interfaz web de diagn\u00f3stico opcional del Controller 6000 se puede utilizar para escribir/leer desde la memoria y, en algunos casos, bloquear el Controller 6000, lo que provoca una denegaci\u00f3n de servicio. Este problema afecta a: Gallagher Controller 6000 8.60 anterior a vCR8.60.231116a (distribuido en 8.60.2550 (MR7)), todas las versiones 8.50 y anteriores." } ], "id": "CVE-2023-24590", "lastModified": "2024-11-21T07:48:11.630", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.9, "source": "disclosures@gallagher.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-18T22:15:08.577", "references": [ { "source": "disclosures@gallagher.com", "tags": [ "Vendor Advisory" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-24590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-24590" } ], "sourceIdentifier": "disclosures@gallagher.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "disclosures@gallagher.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-07-06 17:15
Modified
2024-11-21 06:53
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Gallagher Controller 6000 is vulnerable to a Denial of Service attack via conflicting ARP packets with a duplicate IP address. This issue affects: Gallagher Gallagher Controller 6000 vCR8.60 versions prior to 220303a; vCR8.50 versions prior to 220303a; vCR8.40 versions prior to 220303a; vCR8.30 versions prior to 220303a.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000_firmware | * | |
gallagher | controller_6000 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91424864-71A7-4B38-AD1C-9039C0AAE26B", "versionEndExcluding": "8.30.220303a", "versionStartIncluding": "8.30", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "644E9BF0-6584-4CDD-9B58-C0561646CC63", "versionEndExcluding": "8.40.220303a", "versionStartIncluding": "8.40", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7267DFB8-A8AB-4A74-B11C-16051FC93927", "versionEndExcluding": "8.50.220303a", "versionStartIncluding": "8.50", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "46396C0A-403D-4967-9623-90DB47A8B19D", "versionEndExcluding": "8.60.220303a", "versionStartIncluding": "8.60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF2B03B-B033-439F-8CEE-334FA8053278", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Gallagher Controller 6000 is vulnerable to a Denial of Service attack via conflicting ARP packets with a duplicate IP address. This issue affects: Gallagher Gallagher Controller 6000 vCR8.60 versions prior to 220303a; vCR8.50 versions prior to 220303a; vCR8.40 versions prior to 220303a; vCR8.30 versions prior to 220303a." }, { "lang": "es", "value": "El controlador Gallagher 6000 es vulnerable a un ataque de Denegaci\u00f3n de Servicio por medio de paquetes ARP conflictivos con una direcci\u00f3n IP duplicada. Este problema afecta: Gallagher Controller 6000 versiones vCR8.60 anteriores a 220303a; versiones vCR8.50 anteriores a 220303a; versiones vCR8.40 anteriores a 220303a; versiones vCR8.30 anteriores a 220303a" } ], "id": "CVE-2022-26078", "lastModified": "2024-11-21T06:53:23.507", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "disclosures@gallagher.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-07-06T17:15:07.873", "references": [ { "source": "disclosures@gallagher.com", "tags": [ "Vendor Advisory" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2022-26078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2022-26078" } ], "sourceIdentifier": "disclosures@gallagher.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-754" } ], "source": "disclosures@gallagher.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-12-18 22:15
Modified
2024-11-21 07:44
Severity ?
3.1 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Summary
Improper input validation of a large HTTP request in the Controller 6000 and Controller 7000 optional diagnostic web interface (Port 80) can be used to perform a Denial of Service of the diagnostic web interface.
This issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3183049E-D5F5-416E-B5B6-140B02510BC0", "versionEndIncluding": "8.50", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "162DF4B0-4F15-48D0-9D67-2AD509FD1FAD", "versionEndExcluding": "8.60.231116a", "versionStartIncluding": "8.60", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30EEB0FF-D2F2-47DA-9666-6532730B195F", "versionEndExcluding": "8.70.231204a", "versionStartIncluding": "8.70", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D11F6F34-20E1-4BF8-BA36-819F2B153320", "versionEndExcluding": "8.80.231204a", "versionStartIncluding": "8.80", "vulnerable": true }, { "criteria": "cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "715CA029-60DF-422B-90BA-C806DCE041FC", "versionEndExcluding": "8.90.231204a", "versionStartIncluding": "8.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF2B03B-B033-439F-8CEE-334FA8053278", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*", "matchCriteriaId": "23C4F969-A44F-40D6-A92B-56A2653A0786", "versionEndIncluding": "8.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*", "matchCriteriaId": "189BCB50-4E9F-4E0B-B03F-D703BD14B6C9", "versionEndExcluding": "8.60.231116a", "versionStartIncluding": "8.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*", "matchCriteriaId": "63286868-84A7-492C-8F48-E0FB883C5666", "versionEndExcluding": "8.70.231204a", "versionStartIncluding": "8.70", "vulnerable": true }, { "criteria": "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DE400E-2C3D-485C-8C8E-DA79BC155E7F", "versionEndExcluding": "8.80.231204a", "versionStartIncluding": "8.80", "vulnerable": true }, { "criteria": "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*", "matchCriteriaId": "14A61AE2-E3D1-4BEE-B5E1-361E6E0A617E", "versionEndExcluding": "8.90.231204a", "versionStartIncluding": "8.90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF2B03B-B033-439F-8CEE-334FA8053278", "vulnerable": false }, { "criteria": "cpe:2.3:h:gallagher:controller_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0F7F6A6-8F69-45C1-A59D-D9FB3FD0C1C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nImproper input validation of a large HTTP request in the Controller 6000 and Controller 7000\u00a0optional\u00a0diagnostic web interface (Port 80)\u00a0can be used to perform a Denial of Service of the diagnostic web interface.\n\nThis issue affects: Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.\n\n" }, { "lang": "es", "value": "Se puede utilizar una validaci\u00f3n de entrada incorrecta de una solicitud HTTP grande en la interfaz web de diagn\u00f3stico opcional de Controller 6000 y Controller 7000 (puerto 80) para realizar una denegaci\u00f3n de servicio de la interfaz web de diagn\u00f3stico. Este problema afecta a: \nGallagher Controller 6000 y 7000 8.90 antes de vCR8.90.231204a (distribuido en 8.90.1620 (MR2)), \n8.80 antes de vCR8.80.231204a (distribuido en 8.80.1369 (MR3)), \n8.70 antes de vCR8. 70.231204a (distribuido en 8.70.2375 (MR5)), \n8.60 antes de vCR8.60.231116a (distribuido en 8.60.2550 (MR7)), \ntodas las versiones de 8.50 y anteriores." } ], "id": "CVE-2023-22439", "lastModified": "2024-11-21T07:44:48.323", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "disclosures@gallagher.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-12-18T22:15:07.807", "references": [ { "source": "disclosures@gallagher.com", "tags": [ "Vendor Advisory" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-22439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.gallagher.com/Security-Advisories/CVE-2023-22439" } ], "sourceIdentifier": "disclosures@gallagher.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "disclosures@gallagher.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }