HomeVulnerabilityCISA Flags Essential WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks

CISA Flags Essential WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Wednesday added a crucial security flaw impacting WatchGuard Fireware to its Identified Exploited Vulnerabilities (KEV) catalog, based mostly on proof of energetic exploitation.

The vulnerability in query is CVE-2025-9242 (CVSS rating: 9.3), an out-of-bounds write vulnerability affecting Fireware OS 11.10.2 as much as and together with 11.12.4_Update1, 12.0 as much as and together with 12.11.3 and 2025.1.

“WatchGuard Firebox incorporates an out-of-bounds write vulnerability within the OS iked course of that will permit a distant unauthenticated attacker to execute arbitrary code,” CISA mentioned in an advisory.

Particulars of the vulnerability have been shared by watchTowr Labs final month, with the cybersecurity firm stating that the difficulty stems from a lacking size test on an identification buffer used throughout the IKE handshake course of.

DFIR Retainer Services

“The server does try certificates validation, however that validation occurs after the susceptible code runs, permitting our susceptible code path to be reachable pre-authentication,” security researcher McCaulay Hudson famous.

See also  Asana warns MCP AI function uncovered buyer knowledge to different orgs

There are at present no particulars on how the security defect is being exploited and what is the scale of such efforts. Based on information from the Shadowserver Basis, greater than 54,300 Firebox situations stay susceptible to the crucial bug as of November 12, 2025, down from a excessive of 75,955 on October 19.

Roughly 18,500 of those gadgets are within the U.S., the scans reveal. Italy (5,400), the U.Ok. (4,000), Germany (3,600), and Canada (3,000) spherical up the highest 5. Federal Civilian Government Department (FCEB) businesses are suggested to use WatchGuard’s patches by December 3, 2025.

The event comes as CISA additionally added CVE-2025-62215 (CVSS rating: 7.0), a not too long ago disclosed flaw in Home windows kernel, and CVE-2025-12480 (CVSS rating: 9.1), an improper entry management vulnerability in Gladinet Triofox, to the KEV catalog. Google’s Mandiant Risk Protection workforce has attributed the exploitation of CVE-2025-12480 to a menace actor it tracks as UNC6485.

See also  HelloKitty ransomware now exploiting Apache ActiveMQ flaw in assaults
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular