CVE-2024-1417

7.8 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in WatchGuard AuthPoint Password Manager for macOS. An attacker with local access can execute arbitrary code with the application's privileges. This affects macOS versions before 1.0.6.

💻 Affected Systems

Products:
  • WatchGuard AuthPoint Password Manager
Versions: Versions before 1.0.6
Operating Systems: macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects macOS installations; requires local access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could execute arbitrary code with the application's privileges, potentially leading to full system compromise, credential theft, or lateral movement.

🟠

Likely Case

Local attackers could execute code to steal stored passwords, escalate privileges, or install malware.

🟢

If Mitigated

With proper access controls and patching, the risk is limited to authorized users who might abuse their access.

🌐 Internet-Facing: LOW - This requires local access to the system, not remote exploitation.
🏢 Internal Only: HIGH - Local access is sufficient for exploitation, making it a significant risk for insider threats or compromised accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is likely straightforward given the command injection nature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.6

Vendor Advisory: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00006

Restart Required: Yes

Instructions:

1. Download version 1.0.6 or later from WatchGuard. 2. Install the update. 3. Restart the application or system as required.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and remote local access to systems running vulnerable versions.

🧯 If You Can't Patch

  • Remove or disable AuthPoint Password Manager on affected macOS systems.
  • Implement strict access controls and monitoring for local user activities.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of AuthPoint Password Manager on macOS; if it's below 1.0.6, it's vulnerable.

Check Version:

Check the application's 'About' section or use system commands specific to the installation method.

Verify Fix Applied:

Confirm the version is 1.0.6 or higher after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process executions or command injections from the AuthPoint Password Manager application.

Network Indicators:

  • Not applicable as this is a local exploit.

SIEM Query:

Search for process creation events involving AuthPoint Password Manager with suspicious command-line arguments.

🔗 References

📤 Share & Export