First published: Wed Sep 25 2024(Updated: )
Incorrect Authorization vulnerability in the protocol communication between the WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows and the WatchGuard Single Sign-On Client on Windows and MacOS allows Authentication Bypass.This issue affects the Authentication Gateway: through 12.10.2; Windows Single Sign-On Client: through 12.7; MacOS Single Sign-On Client: through 12.5.4.
Credit: 5d1c2695-1a31-4499-88ae-e847036fd7e3
Affected Software | Affected Version | How to fix |
---|---|---|
WatchGuard Authentication Gateway | <=12.10.2 | |
Watchguard Single Sign-on Client Macos | <=12.5.4 | |
Watchguard Single Sign-on Client Windows | <=12.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6592 is classified as a high severity vulnerability due to its potential for authentication bypass.
To fix CVE-2024-6592, update your WatchGuard Authentication Gateway to version 12.10.3 or later and the Single Sign-On Client to version 12.5.5 for MacOS and 12.7.1 for Windows.
CVE-2024-6592 affects the WatchGuard Authentication Gateway versions up to 12.10.2, and the Single Sign-On Clients for Windows and MacOS up to versions 12.7 and 12.5.4 respectively.
CVE-2024-6592 is an Incorrect Authorization vulnerability that allows for authentication bypass in the communication between WatchGuard components.
There is no official workaround for CVE-2024-6592; updating to the latest versions is the recommended mitigation.