CVE-2024-6594

7.5 HIGH

📋 TL;DR

A denial-of-service vulnerability in WatchGuard Single Sign-On Client for Windows allows attackers with network access to crash the SSO service by sending malformed commands. This affects all Windows systems running WatchGuard SSO Client version 12.7 and earlier. The vulnerability disrupts authentication services but does not allow code execution or privilege escalation.

💻 Affected Systems

Products:
  • WatchGuard Single Sign-On Client
Versions: through 12.7
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows version of WatchGuard SSO Client. Requires network access to the client service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of Single Sign-On authentication services across the organization, preventing users from accessing protected resources and applications.

🟠

Likely Case

Intermittent SSO service crashes affecting user authentication, requiring service restarts and causing temporary access issues.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring detecting anomalous traffic patterns before service disruption.

🌐 Internet-Facing: MEDIUM - Attackers could exploit if SSO client is exposed to internet, but typical deployments are internal.
🏢 Internal Only: HIGH - Most deployments are internal, and any network-connected attacker could disrupt authentication services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the SSO client service. No authentication bypass needed beyond network connectivity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.8 or later

Vendor Advisory: https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2024-00016

Restart Required: Yes

Instructions:

1. Download WatchGuard SSO Client version 12.8 or later from WatchGuard support portal. 2. Install the update on all affected Windows systems. 3. Restart the SSO service or reboot systems as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SSO client service ports to only trusted management systems.

Service Monitoring and Restart

windows

Implement monitoring to detect SSO service crashes and automatically restart the service.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with SSO client service ports
  • Deploy network intrusion detection systems to monitor for malformed command patterns targeting SSO services

🔍 How to Verify

Check if Vulnerable:

Check WatchGuard SSO Client version in Windows Programs and Features or via 'wmic product get name,version' command.

Check Version:

wmic product where "name like 'WatchGuard Single Sign-On Client%'" get name,version

Verify Fix Applied:

Verify installed version is 12.8 or later and test SSO functionality remains stable during normal operations.

📡 Detection & Monitoring

Log Indicators:

  • SSO service crash events in Windows Event Logs
  • Repeated service restart events
  • Authentication failure spikes

Network Indicators:

  • Unusual traffic patterns to SSO client service ports
  • Repeated malformed packets to SSO service

SIEM Query:

EventID=7031 OR EventID=7034 OR (EventID=4625 AND ProcessName contains 'sso')

🔗 References

📤 Share & Export