CVE-2024-41724
Published: 10 March 2025
Description
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Security Summary
CVE-2024-41724 is an Improper Certificate Validation vulnerability (CWE-295) in the SALTO integration of Gallagher Command Centre. This flaw enables an attacker to spoof the SALTO server due to inadequate verification of certificates. The vulnerability affects all versions of Gallagher Command Centre prior to 9.20.1043 and carries a CVSS v3.1 base score of 8.7 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N).
An unauthenticated attacker with network access can exploit this vulnerability through a high-complexity attack that requires no user interaction. By spoofing the SALTO server, the attacker achieves high-impact confidentiality and integrity violations across the affected scope, potentially allowing unauthorized access to or manipulation of integration-related data and functions between Gallagher Command Centre and SALTO systems.
The Gallagher Security Advisory at https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2024-41724 provides details on mitigation. Security practitioners should upgrade to Gallagher Command Centre version 9.20.1043 or later to address the issue.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The vulnerability allows an attacker to spoof the SALTO server due to improper certificate validation, directly enabling an adversary-in-the-middle attack to intercept and manipulate communications.