{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T21:42:30.296","vulnerabilities":[{"cve":{"id":"CVE-2023-23576","sourceIdentifier":"disclosures@gallagher.com","published":"2023-12-18T22:15:08.210","lastModified":"2024-11-21T07:46:27.683","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nIncorrect behavior order in the Command Centre Server could allow privileged users to gain physical access to the site for longer than intended after a network outage when competencies are used in the access decision. \n\nThis issue affects: Gallagher Command Centre: 8.90 prior to vEL8.90.1620 (MR2), 8.80 prior to vEL8.80.1369 (MR3), 8.70 prior to vEL8.70.2375 (MR5), 8.60 prior to vEL8.60.2550 (MR7), all versions of 8.50 and prior.\n\n"},{"lang":"es","value":"El orden de comportamiento incorrecto en Command Center Server podría permitir que los usuarios privilegiados obtengan acceso físico al sitio durante más tiempo del previsto después de una interrupción de la red cuando se utilizan competencias en la decisión de acceso. Este problema afecta a: Gallagher Command Center: 8.90 anterior a vEL8.90.1620 (MR2), 8.80 anterior a vEL8.80.1369 (MR3), 8.70 anterior a vEL8.70.2375 (MR5), 8.60 anterior a vEL8.60.2550 (MR7), todas las versiones de 8.50 y anteriores."}],"metrics":{"cvssMetricV31":[{"source":"disclosures@gallagher.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.7,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.7,"impactScore":3.6}]},"weaknesses":[{"source":"disclosures@gallagher.com","type":"Secondary","description":[{"lang":"en","value":"CWE-696"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*","versionEndIncluding":"8.50","matchCriteriaId":"23C4F969-A44F-40D6-A92B-56A2653A0786"},{"vulnerable":true,"criteria":"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*","versionStartIncluding":"8.60","versionEndExcluding":"8.60.2550","matchCriteriaId":"54586395-20DD-4AB8-8C2A-26870B1522A2"},{"vulnerable":true,"criteria":"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*","versionStartIncluding":"8.70","versionEndExcluding":"8.70.2375","matchCriteriaId":"1E787E1B-4152-4F45-8E6E-1761938E48A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*","versionStartIncluding":"8.80","versionEndExcluding":"8.80.1369","matchCriteriaId":"6091751E-0326-445F-ABFF-09BE6D3543BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*","versionStartIncluding":"8.90","versionEndExcluding":"8.90.1620","matchCriteriaId":"1B0605C7-4DC1-4F63-9987-D3320AC4D6A5"}]}]}],"references":[{"url":"https://security.gallagher.com/Security-Advisories/CVE-2023-23576","source":"disclosures@gallagher.com","tags":["Vendor Advisory"]},{"url":"https://security.gallagher.com/Security-Advisories/CVE-2023-23576","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}