HomeWatchguardCVE-2024-6592

CVE-2024-6592

CRITICAL
9.1CVSS
Published: 2024-09-25
Updated: 2025-10-15
AI Analysis

Description

Incorrect Authorization vulnerability in the protocol communication between the WatchGuard Authentication Gateway (aka Single Sign-On Agent) on Windows and the WatchGuard Single Sign-On Client on Windows and MacOS allows Authentication Bypass.This issue affects the Authentication Gateway: through 12.10.2; Windows Single Sign-On Client: through 12.7; MacOS Single Sign-On Client: through 12.5.4.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-306CWE-863

Metadata

Primary Vendor
WATCHGUARD
Published
9/25/2024
Last Modified
10/15/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

watchguard : authentication_gatewaywatchguard : single_sign-on_clientwatchguard : single_sign-on_client

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief