CVE-2024-43107
Published: 10 March 2025
Summary
CVE-2024-43107 is a high-severity Improper Certificate Validation (CWE-295) vulnerability in Gallagher Milestone Integration (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-17 (Public Key Infrastructure Certificates) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of PKI certificates, including certification path construction and status checks, to prevent acceptance of unauthenticated messages due to improper certificate validation.
Mandates timely identification, reporting, and correction of system flaws like this improper certificate validation vulnerability through software updates.
Protects communication session authenticity to mitigate acceptance of unauthorized alarm events and messages lacking proper sender authentication.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Improper certificate validation enables remote unauthenticated attackers to send messages to the plugin, directly facilitating exploitation of a public-facing application.
NVD Description
Improper Certificate Validation (CWE-295) in the Gallagher Milestone Integration Plugin (MIP) permits unauthenticated messages (e.g. alarm events) to be sent to the Plugin. This issue effects Gallagher MIPS Plugin v4.0 prior to v4.0.32, all versions of v3.0 and prior.
Deeper analysisAI
CVE-2024-43107 is an Improper Certificate Validation vulnerability (CWE-295) in the Gallagher Milestone Integration Plugin (MIP). The flaw permits unauthenticated messages, such as alarm events, to be sent to the plugin due to inadequate certificate checks. It affects Gallagher MIP Plugin versions 4.0 prior to 4.0.32, as well as all versions of 3.0 and prior.
The vulnerability has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L), indicating it is exploitable remotely over the network by unauthenticated attackers with low complexity and no user interaction. Attackers can send unauthorized messages to the plugin, achieving low-level impacts on integrity and availability with a changed scope.
The Gallagher security advisory provides further details on mitigation, available at https://security.gallagher.com/en-NZ/Security-Advisories/CVE-2024-43107. Affected systems should be updated to Gallagher MIP Plugin v4.0.32 or later to address the issue.
Details
- CWE(s)