WatchGuard Authentication Gateway Recommends Single Sign-On Security Measures

Overview

 

WatchGuard Authentication Gateway, Single Sign-On has announced a workaround to address a vulnerability in WatchGuard Authentication Gateway, Single Sign-On. Users of affected systems should follow the “Vulnerability Mitigation”.

 

Affected Products

CVE-2024-6592

  • Authentication Gateway versions: ~ 12.10.2 (inclusive)
  • Windows Single Sign-On Client versions: ~ 12.7 (inclusive)
  • MacOS Single Sign-On Client versions: ~ 12.5.4 (inclusive)

 

CVE-2024-6593

  • Authentication Gateway versions: ~ 12.10.2 (inclusive)

 

 

Resolved Vulnerabilities

 

Incorrect authentication vulnerability in protocol communication between WatchGuard Authentication Gateway on Windows and WatchGuard Single Sign-On client on Windows and macOS that could allow authentication bypass (CVE-2024-6592)

Incorrect authorization vulnerability in WatchGuard Authentication Gateway on Windows (CVE-2024-6593)

 

vulnerability Mitigation
 

  • Use Windows Firewall rules to restrict TCP port 4116 network access to single sign-on clients to allow connections only from the Authentication Gateway (SSO Agent)
  • Recommend restricting TCP port 4114 network access to Authentication Gateway to allow connections only from the Firebox

 

References

 

[1] CVE-2024-6592 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-6592

[2] WatchGuard Firebox Single Sign-On Agent Protocol Authorization Bypass

https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00014

[3] CVE-2024-6593 Detail

https://nvd.nist.gov/vuln/detail/CVE-2024-6593

[4] WatchGuard SSO Agent Telnet Authentication Bypass

https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00015