Original Article Text

Click to Toggle View

Over 75,000 WatchGuard security devices vulnerable to critical RCE. Nearly 76,000 WatchGuard Firebox network security appliances are exposed on the public web and still vulnerable to a critical issue (CVE-2025-9242) that could allow a remote attacker to execute code without authentication. Firebox devices act as a central defense hub that controls traffic between internal and external networks, providing protection through policy management, security services, VPN, and real-time real-time visibility through WatchGuard Cloud. Scans from The Shadowserver Foundation currently show that there are 75,835 vulnerable Firebox appliances across the world, most of them in Europe and North America. Specifically, the United States tops the list with 24,500 endpoints, followed by Germany (7,300), Italy (6,800), United Kingdom (5,400), Canada (4,100), and France (2,000). WatchGuard disclosed CVE-2025-9242 in a security bulletin on September 17 and rated the vulnerability with a critical-severity score of 9.3. The security problem is an out-of-bounds write in the Fireware OS ‘iked’ process, which handles IKEv2 VPN negotiations. The flaw can be exploited without authentication by sending specially crafted IKEv2 packets to vulnerable Firebox endpoints, forcing it to write data to unintended memory areas. It only affects Firebox appliances that use IKEv2 VPNs with dynamic gateway peers, on versions 11.10.2 through 11.12.4_Update1, 12.0 through 12.11.3, and 2025.1 The vendor suggested an upgrade to one of the following versions: Users should know that version 11.x has reached end of support and will not receive security updates. The recommendation for them is to move to a version that is still supported. For devices set up only with Branch Office VPNs to static gateway peers, the vendor points to the documentation for securing the connection using the IPSec and IKEv2 protocols as a temporary workaround. On October 19, The Shadowserver Foundation detected 75,955 vulnerable Firebox firewalls. A spokesperson told BleepingComputer that the current scan is considered reliable, and the figures reflect real deployments and not honeypots, yet. Although no active exploitation of CVE-2025-9242 has been reported yet, administrators who haven’t applied the security updates are strongly advised to install the patch as soon as possible. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.

Daily Brief Summary

VULNERABILITIES // Critical RCE Vulnerability Affects 75,000 WatchGuard Devices Globally

Nearly 76,000 WatchGuard Firebox appliances are vulnerable to CVE-2025-9242, a critical remote code execution flaw, with the majority located in Europe and North America.

The vulnerability, rated 9.3 in severity, involves an out-of-bounds write in the Fireware OS 'iked' process, affecting IKEv2 VPN negotiations.

Exploitation can occur without authentication by sending crafted IKEv2 packets, potentially compromising network security by writing data to unintended memory areas.

WatchGuard has recommended upgrading to supported software versions, as version 11.x has reached end of support and will not receive further updates.

Temporary workarounds involve securing connections using IPSec and IKEv2 protocols for specific VPN setups, as detailed in vendor documentation.

The Shadowserver Foundation's scans confirm the vulnerability's prevalence, with 75,955 devices still at risk as of October 19, 2025.

No active exploitation has been reported yet, but administrators are urged to apply patches promptly to mitigate potential threats.