Platform
other
Component
gallagher-command-centre
Fixed in
8.10.1284
8.20.1259
8.30.1359
8.40.1888
CVE-2021-23230 describes a critical SQL Injection vulnerability discovered in the OPCUA interface of Gallagher Command Centre. This vulnerability allows a remote, unprivileged Command Centre Operator to modify Command Centre databases without detection, posing a significant risk to data integrity and system security. The vulnerability impacts versions 8.40 and prior, 8.30 and prior, 8.20 and prior, 8.10 and prior, and 8.00 and prior. A fix is available in version 8.40.1888 (MR3).
The SQL Injection vulnerability in Gallagher Command Centre allows an attacker to inject malicious SQL code into the OPCUA interface. Successful exploitation enables an unauthenticated or low-privilege Command Centre Operator to directly manipulate the Command Centre’s databases. This could involve unauthorized modification of user accounts, access control lists, event logs, or other sensitive data. The undetected nature of the modification amplifies the risk, as malicious changes could persist without immediate detection. The potential impact extends beyond data theft to include complete system compromise, enabling attackers to gain persistent access and control over the security system. While no direct precedent exists for this specific vulnerability, SQL Injection vulnerabilities are consistently exploited to gain unauthorized access and escalate privileges, mirroring the potential impact of similar attacks.
CVE-2021-23230 was publicly disclosed on June 11, 2021. The vulnerability has not been added to the CISA KEV catalog as of this writing. There are currently no publicly available proof-of-concept exploits, but the severity of the vulnerability (CVSS 9.9) suggests a high probability of exploitation if a suitable exploit is developed and released. Given the critical nature and the potential for undetected data modification, organizations using affected versions should prioritize remediation.
Exploit Status
EPSS
0.25% (48% percentile)
CVSS Vector
The primary mitigation for CVE-2021-23230 is to immediately upgrade Gallagher Command Centre to version 8.40.1888 (MR3) or a later patched version. If upgrading is not immediately feasible due to compatibility issues or system downtime constraints, consider implementing temporary workarounds. While a direct WAF rule is difficult to implement without specific knowledge of the attack patterns, restricting access to the OPCUA interface to trusted networks and users can reduce the attack surface. Regularly review and audit Command Centre database access logs for any suspicious activity. Implement stricter authentication and authorization controls for Command Centre Operators to limit the potential impact of a compromised account. After upgrading, confirm the fix by attempting to trigger the SQL injection vulnerability through the OPCUA interface and verifying that the input is properly sanitized.
Actualice Gallagher Command Centre a la versión 8.40.1888 (MR3), 8.30.1359 (MR3), 8.20.1259 (MR5), 8.10.1284 (MR7) o una versión posterior. Esto corrige la vulnerabilidad de inyección SQL en la interfaz OPCUA.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2021-23230 is a critical SQL Injection vulnerability in the OPCUA interface of Gallagher Command Centre, allowing attackers to modify databases undetected.
You are affected if you are using Gallagher Command Centre versions 8.40 and prior, 8.30 and prior, 8.20 and prior, 8.10 and prior, or 8.00 and prior.
Upgrade to Gallagher Command Centre version 8.40.1888 (MR3) or a later patched version. Implement temporary workarounds if immediate upgrade is not possible.
While no public exploits are currently known, the vulnerability's severity suggests a high probability of exploitation if a suitable exploit is developed.
Refer to the Gallagher Command Centre security advisory on their website for detailed information and updates: [https://www.gallagher.com/security-advisories](https://www.gallagher.com/security-advisories)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.