Skip to main content

Public Proof-of-Concept for WatchGuard Vulnerabilities Affecting Firebox SSO Gateway and Client

Advisories address critical vulnerabilities which could lead to authentication bypass, authorisation bypass, or denial-of-service

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Advisories address critical vulnerabilities which could lead to authentication bypass, authorisation bypass, or denial-of-service


Threat details

Proof-of-Concept exploit for CVE-2024-6592, CVE-2024-6593 & CVE-2024-6594

Proof-of-concept code is publicly available and exploitation is considered more likely.


Introduction

WatchGuard has released security advisories addressing three vulnerabilities affecting Firebox SSO product lines. The vulnerabilities affect Firebox Authentication Gateway, also known as the Single Sign-On Agent, as well as the Single Sign-On Client on Windows and MacOS. WatchGuard Firebox is product line of physical and virtual firewalls with Single Sign-on capabilities.


Vulnerability Details

  • CVE-2024-6592 has a CVSSv3 score of 9.1 and is an incorrect authorisation vulnerability in the protocol communication between the gateway and client and could allow an attacker with network access to forge communication to the affected components, potentially leading to authorisation bypass.
     
  • CVE-2024-6593 has a CVSSv3 score of 9.1 and is an incorrect authorisation vulnerability in the authentication gateway on Windows and could allow an attacker with network access to execute restricted management commands, potentially leading to authentication bypass.
     
  • CVE-2024-6594 has a CVSSv3 score of 7.5 is an improper handling of exceptional conditions vulnerability in the Single Sign-On Client on Windows which causes the client to crash while handling malformed commands, potentially leading to denial-of-service.

Remediation advice

Affected organisations are encouraged to review the WatchGuard Security Advisories page and apply the relevant workarounds detailed in the advisories below.


Remediation steps

Type Step
Guidance

WatchGuard Firebox Single Sign-On Agent Protocol Authorization Bypass | wgsa-2024-00014


https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00014
Guidance

WatchGuard SSO Agent Telnet Authentication Bypass | WGSA-2024-00015


https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00015
Guidance

WatchGuard Firebox Single Sign-On Client Denial-of-Service | WGSA-2024-00016


https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00016

Definitive source of threat updates


Last edited: 30 September 2024 3:37 pm