Vulnerability Description
In Gallagher Command Centre versions 8.10 prior to 8.10.1134(MR4), 8.00 prior to 8.00.1161(MR5), 7.90 prior to 7.90.991(MR5), 7.80 prior to 7.80.960(MR2), 7.70 and earlier, any operator account has access to all data that would be replicated if the system were to be (or is) attached to a multi-server environment. This can include plain text credentials for DVR systems and card details used for physical access/alarm/perimeter components.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gallagher | Command Centre | >= 7.80, < 7.80.960 |
Related Weaknesses (CWE)
References
- https://security.gallagher.com/Security-Advisories/CVE-2020-16096Vendor Advisory
- https://security.gallagher.com/Security-Advisories/CVE-2020-16096Vendor Advisory
FAQ
What is CVE-2020-16096?
CVE-2020-16096 is a vulnerability with a CVSS score of 9.9 (CRITICAL). In Gallagher Command Centre versions 8.10 prior to 8.10.1134(MR4), 8.00 prior to 8.00.1161(MR5), 7.90 prior to 7.90.991(MR5), 7.80 prior to 7.80.960(MR2), 7.70 and earlier, any operator account has ac...
How severe is CVE-2020-16096?
CVE-2020-16096 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-16096?
Check the references section above for vendor advisories and patch information. Affected products include: Gallagher Command Centre.