Incorrect Authorization vulnerability in WatchGuard Authentication Gateway allows Authentication Bypass
CVE-2024-6592
Key Information:
- Vendor
- Watchguard
- Vendor
- CVE Published:
- 25 September 2024
Badges
Summary
An incorrect authorization vulnerability has been identified in the protocol communication between the WatchGuard Authentication Gateway (also known as the Single Sign-On Agent) and the WatchGuard Single Sign-On Client on both Windows and MacOS systems. This vulnerability allows for an authentication bypass, enabling unauthorized access to systems. Affected versions include the Authentication Gateway up to 12.10.2, the Windows Single Sign-On Client up to version 12.7, and the MacOS Single Sign-On Client up to 12.5.4. A patch is recommended for all users utilizing these specific versions to mitigate risks associated with this vulnerability.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
Vulnerability published
- 🟡
Public PoC available
- 👾
Exploit known to exist