Incorrect Authorization vulnerability in WatchGuard Authentication Gateway allows Authentication Bypass
CVE-2024-6592

9.1CRITICAL

Key Information:

Vendor
Watchguard
Vendor
CVE Published:
25 September 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

An incorrect authorization vulnerability has been identified in the protocol communication between the WatchGuard Authentication Gateway (also known as the Single Sign-On Agent) and the WatchGuard Single Sign-On Client on both Windows and MacOS systems. This vulnerability allows for an authentication bypass, enabling unauthorized access to systems. Affected versions include the Authentication Gateway up to 12.10.2, the Windows Single Sign-On Client up to version 12.7, and the MacOS Single Sign-On Client up to 12.5.4. A patch is recommended for all users utilizing these specific versions to mitigate risks associated with this vulnerability.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

.
CVE-2024-6592 : Incorrect Authorization vulnerability in WatchGuard Authentication Gateway allows Authentication Bypass | SecurityVulnerability.io