cve/2024/CVE-2024-6592.md
2025-09-29 21:09:30 +02:00

22 lines
1.2 KiB
Markdown

### [CVE-2024-6592](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6592)
![](https://img.shields.io/static/v1?label=Product&message=Authentication%20Gateway&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Single%20Sign-On%20Client&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-863%20Incorrect%20Authorization&color=brightgreen)
### Description
Incorrect Authorization vulnerability in the protocol communication between the WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows and the WatchGuard Single Sign-On Client on Windows and MacOS allows Authentication Bypass.This issue affects the Authentication Gateway: through 12.10.2; Windows Single Sign-On Client: through 12.7; MacOS Single Sign-On Client: through 12.5.4.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/RedTeamPentesting/watchguard-sso-client
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/rajeshwarideoraj/Vulnerability_Data_Extraction_and_Analysis