Cyber Posture

CVE-2024-41724

High

Published: 10 March 2025

Published
10 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
EPSS Score 0.0008 24.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-41724 is a high-severity Improper Certificate Validation (CWE-295) vulnerability in Gallagher Command Centre (inferred from references). Its CVSS base score is 8.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Adversary-in-the-Middle (T1557); ranked at the 24.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-9 (Service Identification and Authentication) and SC-17 (Public Key Infrastructure Certificates).

Threat & Defense at a Glance

What attackers do: exploitation maps to Adversary-in-the-Middle (T1557). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires proper validation of PKI certificates, addressing the improper certificate validation that enables SALTO server spoofing.

prevent

Mandates identification and authentication of external services like the SALTO server integration to prevent spoofing attacks.

prevent

Provides remediation of the specific software flaw in certificate validation by applying patches to Gallagher Command Centre version 9.20.1043 or later.

MITRE ATT&CK Enterprise TechniquesAI

T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

The vulnerability allows an attacker to spoof the SALTO server due to improper certificate validation, directly enabling an adversary-in-the-middle attack to intercept and manipulate communications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Certificate Validation (CWE-295) in the Gallagher Command Centre SALTO integration allowed an attacker to spoof the SALTO server. This issue affects all versions of Gallagher Command Centre prior to 9.20.1043.

Deeper analysisAI

CVE-2024-41724 is an Improper Certificate Validation vulnerability (CWE-295) in the SALTO integration of Gallagher Command Centre. This flaw enables an attacker to spoof the SALTO server due to inadequate verification of certificates. The vulnerability affects all versions of Gallagher Command Centre prior to 9.20.1043 and carries a CVSS v3.1 base score of 8.7 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N).

An unauthenticated attacker with network access can exploit this vulnerability through a high-complexity attack that requires no user interaction. By spoofing the SALTO server, the attacker achieves high-impact confidentiality and integrity violations across the affected scope, potentially allowing unauthorized access to or manipulation of integration-related data and functions between Gallagher Command Centre and SALTO systems.

The Gallagher Security Advisory at https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2024-41724 provides details on mitigation. Security practitioners should upgrade to Gallagher Command Centre version 9.20.1043 or later to address the issue.

Details

CWE(s)

Affected Products

Gallagher
Command Centre
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-1193Shared CWE-295
CVE-2025-46788Shared CWE-295
CVE-2026-33810Shared CWE-295
CVE-2026-32627Shared CWE-295
CVE-2024-55581Shared CWE-295
CVE-2025-11043Shared CWE-295
CVE-2026-4434Shared CWE-295
CVE-2026-25160Shared CWE-295
CVE-2025-0500Shared CWE-295
CVE-2026-4396Shared CWE-295

References