FKIE_CVE-2025-44003
Vulnerability from fkie_nvd - Published: 2025-07-10 03:15 - Updated: 2025-07-10 13:17
Severity ?
Summary
Missing Release of Resource after Effective Lifetime (CWE-772) in the Gallagher T-Series Reader allows an attacker with physical access to the reader to perform a limited denial of service when 125 kHz Card Technology is enabled.
This issue affects T-Series Readers: 9.20 prior to vCR9.20.250213a (distributed in 9.20.1827 (MR2)), 9.10 prior to vCR9.10.250213a (distributed in 9.10.2692(MR5)), 9.00 prior to vCR9.00.250619a (distributed in vEL9.00.3371 (MR7)), all versions of 8.90 and prior.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Release of Resource after Effective Lifetime (CWE-772) in the Gallagher T-Series Reader allows an attacker with physical access to the reader to perform a limited denial of service when 125 kHz Card Technology is enabled.\n\nThis issue affects T-Series Readers: 9.20 prior to vCR9.20.250213a (distributed in 9.20.1827 (MR2)), 9.10 prior to vCR9.10.250213a (distributed in 9.10.2692(MR5)), 9.00 prior to vCR9.00.250619a (distributed in \u00a0vEL9.00.3371 (MR7)), \u00a0all versions of 8.90 and prior."
},
{
"lang": "es",
"value": "La falta de liberaci\u00f3n de recursos tras el tiempo de vida \u00fatil (CWE-772) en el lector Gallagher Serie T permite a un atacante con acceso f\u00edsico al lector realizar una denegaci\u00f3n de servicio limitada cuando la tecnolog\u00eda de tarjeta de 125 kHz est\u00e1 habilitada. Este problema afecta a los lectores Serie T: versiones 9.20 anteriores a vCR9.20.250213a (distribuida en 9.20.1827 (MR2)), versiones 9.10 anteriores a vCR9.10.250213a (distribuida en 9.10.2692 (MR5)), versiones 9.00 anteriores a vCR9.00.250619a (distribuida en vEL9.00.3371 (MR7)), y todas las versiones de 8.90 y anteriores."
}
],
"id": "CVE-2025-44003",
"lastModified": "2025-07-10T13:17:30.017",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "disclosures@gallagher.com",
"type": "Secondary"
}
]
},
"published": "2025-07-10T03:15:28.880",
"references": [
{
"source": "disclosures@gallagher.com",
"url": "https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2025-44003"
}
],
"sourceIdentifier": "disclosures@gallagher.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-772"
}
],
"source": "disclosures@gallagher.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…