Vulnerability Description
Incorrect Authorization vulnerability in the protocol communication between the WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows and the WatchGuard Single Sign-On Client on Windows and MacOS allows Authentication Bypass.This issue affects the Authentication Gateway: through 12.10.2; Windows Single Sign-On Client: through 12.7; MacOS Single Sign-On Client: through 12.5.4.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Watchguard | Authentication Gateway | <= 12.10.2 |
| Watchguard | Single Sign-On Client | <= 12.5.4 |
Related Weaknesses (CWE)
References
- https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00014MitigationVendor Advisory
FAQ
What is CVE-2024-6592?
CVE-2024-6592 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Incorrect Authorization vulnerability in the protocol communication between the WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows and the WatchGuard Single Sign-On Client on Wind...
How severe is CVE-2024-6592?
CVE-2024-6592 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-6592?
Check the references section above for vendor advisories and patch information. Affected products include: Watchguard Authentication Gateway, Watchguard Single Sign-On Client.