FKIE_CVE-2024-23485
Vulnerability from fkie_nvd - Published: 2024-07-11 03:15 - Updated: 2024-11-21 08:57
Severity ?
Summary
Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation (CWE-1304) in the Controller 6000 and 7000 can lead to secured door locks connected via Aperio Communication Hubs to momentarily allow free access.
This issue affects: Gallagher Controller 6000 and 7000 9.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), 8.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)), 8.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation (CWE-1304) in the Controller 6000 and 7000 can lead to secured door locks connected via Aperio Communication Hubs to momentarily allow free access.\u00a0\n\nThis issue affects:\u00a0Gallagher Controller 6000 and 7000\u00a09.10 prior to vCR9.10.240520a (distributed in 9.10.1268(MR1)), 9.00 prior to vCR9.00.240521a (distributed in 9.00.1990(MR3)), \u00a08.90 prior to vCR8.90.240520a (distributed in 8.90.1947 (MR4)),\u00a08.80 prior to vCR8.80.240520a (distributed in 8.80.1726 (MR5)), 8.70 prior to vCR8.70.240520a (distributed in 8.70.2824 (MR7)), all versions of 8.60 and prior."
},
{
"lang": "es",
"value": "La integridad preservada inadecuadamente del estado de configuraci\u00f3n del hardware durante una operaci\u00f3n de ahorro/restauraci\u00f3n de energ\u00eda (CWE-1304) en el controlador 6000 y 7000 puede provocar que puertas cerradas seguras conectadas a trav\u00e9s de concentradores de comunicaci\u00f3n Aperio permitan moment\u00e1neamente el libre acceso. Este problema afecta a: Gallagher Controller 6000 y 7000 9.10 antes de vCR9.10.240520a (distribuido en 9.10.1268(MR1)), 9.00 antes de vCR9.00.240521a (distribuido en 9.00.1990(MR3)), 8.90 antes de vCR8. 90.240520a (distribuido en 8.90.1947 (MR4)), 8.80 antes de vCR8.80.240520a (distribuido en 8.80.1726 (MR5)), 8.70 antes de vCR8.70.240520a (distribuido en 8.70.2824 (MR7)), todos Versiones de 8.60 y anteriores."
}
],
"id": "CVE-2024-23485",
"lastModified": "2024-11-21T08:57:48.497",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6,
"source": "disclosures@gallagher.com",
"type": "Secondary"
}
]
},
"published": "2024-07-11T03:15:03.327",
"references": [
{
"source": "disclosures@gallagher.com",
"url": "https://security.gallagher.com/Security-Advisories/CVE-2024-23485"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gallagher.com/Security-Advisories/CVE-2024-23485"
}
],
"sourceIdentifier": "disclosures@gallagher.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1304"
}
],
"source": "disclosures@gallagher.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…