Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-6592 PoC — WatchGuard Authentication Gateway 安全漏洞

Source
Associated Vulnerability
Title:WatchGuard Authentication Gateway 安全漏洞 (CVE-2024-6592)
Description:WatchGuard Authentication Gateway(WatchGuard Single Sign-On Agent)是美国WatchGuard公司的一个身份验证网关。 WatchGuard Authentication Gateway 12.10.2及之前版本存在安全漏洞,该漏洞源于在Windows和macOS上的协议通信中存在授权错误,允许攻击者进行认证绕过。
Description
Client Implementation for the WatchGuard SSO Agent Protocol used for Security Research (CVE-2024-6592, CVE-2024-6593, CVE-2024-6594)
Readme
# Proof of Concept for Watchguard SSO Agent Vulnerabilitites (CVE-2024-6592, CVE-2024-6593, CVE-2024-6594)

Details are described in our advisories available at:

 * [CVE-2024-6592](https://www.redteam-pentesting.de/advisories/rt-sa-2024-006)
 * [CVE-2024-6593](https://www.redteam-pentesting.de/advisories/rt-sa-2024-007)
 * [CVE-2024-6594](https://www.redteam-pentesting.de/advisories/rt-sa-2024-008)

The script requires the Python [click](https://click.palletsprojects.com/) library to run.

# Examples
## Issue Arbitrary Commands to SSO Clients

The subcommand `command` can be used to issue commands to the Telnet interface of a Watchguard SSO client. For example, the list of currently logged-in users can be retrieved:

 ```
$ ./wgclient.py command --host 'client.domainname' 'get user a'
 ```


## Retrieve Log files from SSO Clients

The subcommand `logfile` can be used to retrieve log files of an Watchguard SSO client. The log files may also include crash memory dumps (see [CVE-2024-6592](https://www.redteam-pentesting.de/advisories/rt-sa-2024-006) for details).

```
$ ./wgclient.py logfile --host 'client.domainname'
```

## Calculate Authentication Bypass Secret

The subcommand `authbypass` can be used to calculated a secret value to login to the Telnet management interface of an Watchguard SSO agent. To secret is calculated from the banner that the agent sends upon connection, which has to be provided as argument. Details are available in the advisory for [CVE-2024-6593](https://www.redteam-pentesting.de/advisories/rt-sa-2024-007).

```
$ ./wgclient.py authbypass 'EVENT 350 log info Connected to [...]'
```
File Snapshot

[4.0K] /data/pocs/9e96e8f16384110794cf23f9f37b6277d80d6539 ├── [1.0K] LICENSE ├── [1.6K] README.md └── [4.0K] wgclient.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.