WatchGuard Authentication Gateway Recommends Single Sign-On Security Measures
Overview
WatchGuard Authentication Gateway, Single Sign-On has announced a workaround to address a vulnerability in WatchGuard Authentication Gateway, Single Sign-On. Users of affected systems should follow the “Vulnerability Mitigation”.
Affected Products
CVE-2024-6592
- Authentication Gateway versions: ~ 12.10.2 (inclusive)
- Windows Single Sign-On Client versions: ~ 12.7 (inclusive)
- MacOS Single Sign-On Client versions: ~ 12.5.4 (inclusive)
CVE-2024-6593
- Authentication Gateway versions: ~ 12.10.2 (inclusive)
Resolved Vulnerabilities
Incorrect authentication vulnerability in protocol communication between WatchGuard Authentication Gateway on Windows and WatchGuard Single Sign-On client on Windows and macOS that could allow authentication bypass (CVE-2024-6592)
Incorrect authorization vulnerability in WatchGuard Authentication Gateway on Windows (CVE-2024-6593)
vulnerability Mitigation
- Use Windows Firewall rules to restrict TCP port 4116 network access to single sign-on clients to allow connections only from the Authentication Gateway (SSO Agent)
- Recommend restricting TCP port 4114 network access to Authentication Gateway to allow connections only from the Firebox
References
[1] CVE-2024-6592 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-6592
[2] WatchGuard Firebox Single Sign-On Agent Protocol Authorization Bypass
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00014
[3] CVE-2024-6593 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-6593
[4] WatchGuard SSO Agent Telnet Authentication Bypass
https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00015