{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T09:56:26.321","vulnerabilities":[{"cve":{"id":"CVE-2022-26348","sourceIdentifier":"disclosures@gallagher.com","published":"2022-07-06T17:15:07.937","lastModified":"2024-11-21T06:53:48.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Command Centre Server is vulnerable to SQL Injection via Windows Registry settings for date fields on the server. The Windows Registry setting allows an attacker using the Visitor Management Kiosk, an application designed for public use, to invoke an arbitrary SQL query that has been preloaded into the registry of the Windows Server to obtain sensitive information. This issue affects: Gallagher Command Centre 8.60 versions prior to 8.60.1652; 8.50 versions prior to 8.50.2245; 8.40 versions prior to 8.40.2216; 8.30 versions prior to 8.30.1470; version 8.20 and prior versions."},{"lang":"es","value":"Command Centre Server es vulnerable a una inyección SQL por medio de la configuración del Registro de Windows para los campos de fecha en el servidor. La configuración del Registro de Windows permite a un atacante usando el Kiosco de Administración de Visitantes, una aplicación diseñada para uso público, invocar una consulta SQL arbitraria que ha sido precargada en el registro del Servidor de Windows para obtener información confidencial. Este problema afecta a: Gallagher Command Centre versiones 8.60 anteriores a 8.60.1652; versiones 8.50 anteriores a 8.50.2245; versiones 8.40 anteriores a 8.40.2216; versiones 8.30 anteriores a 8.30.1470; versiones 8.20 y anteriores"}],"metrics":{"cvssMetricV31":[{"source":"disclosures@gallagher.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.5,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"disclosures@gallagher.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*","versionEndIncluding":"8.20","matchCriteriaId":"08FDEAA9-8012-4149-9D76-77E41CB4DD10"},{"vulnerable":true,"criteria":"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*","versionStartIncluding":"8.30","versionEndExcluding":"8.30.1470","matchCriteriaId":"B661AF12-667B-4470-984E-AC109FE1B4A2"},{"vulnerable":true,"criteria":"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*","versionStartIncluding":"8.40","versionEndExcluding":"8.40.2216","matchCriteriaId":"4D083D37-176B-4A15-83D9-0486A2355D83"},{"vulnerable":true,"criteria":"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*","versionStartIncluding":"8.50","versionEndExcluding":"8.50.2245","matchCriteriaId":"2F3A5031-A6FF-4A4F-8B2F-14389BA76F0E"},{"vulnerable":true,"criteria":"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*","versionStartIncluding":"8.60","versionEndExcluding":"8.60.1652","matchCriteriaId":"58EF5C9C-9377-44A2-9EA8-664650955786"}]}]}],"references":[{"url":"https://security.gallagher.com/Security-Advisories/CVE-2022-26348","source":"disclosures@gallagher.com","tags":["Vendor Advisory"]},{"url":"https://security.gallagher.com/Security-Advisories/CVE-2022-26348","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}